MTA
Fundamental characteristics of databases:
- Designed to store billions of rows of data - Limited to computers available hard disk space - Optimized to use all a computers available memory to improve performance
Three Types of Databases:
- Flat type databases - Hierarchical databases - Relational database
DBMS
A collection of programs that enables you to enter, organize, and select data in a database
SQLCMD
A command-line application that comes with Microsoft SQL Server and exposes the management features of SQLServer. Allows SQL queries to be written and executed from the command prompt. Can also act as a scripting language to create and run a set of SQL statements as a script
Index
A data structure that improves the speed of data retrieval operations on a database table. Disadvantages include that they need to be created and updated which requires processing resources and takes up disk space
XQuery
A query and functional programming language that is designed to query collections of XML data
Data Definition Language (DDL)
A subset of the Transact-SQL language; deals with creating database objects like tables, constraints, and stored procedures. USE CREATE ALTER DROP TRUNCATE DELETE
You work as a Database Administrator for Dowtech Inc. A table named StudentInformation exists in a database. The table has columns named student_names, student_marks, and student_courses. Some students who have opted for various courses have got different marks in them. This implies that the table has two many-to-many relationships. You have to ensure that these two relationships are not represented in a single table and that the student_name column exists in both tables. Which of the following normal forms will you use to represent these relationships in the tables? A. 4 NF B. 3 NF C. 2 NF D. 1 NF
A. 4NF
Mark works as a Database Designer for Reon Inc. He is assigned the task to create a database for the company. He issues the following query to create the database. CREATE DATABASE '24342' What will be the output of the query? A. A database will be created. B. An error will be generated stating that a database name must begin with an alphabet and all the alphabets should be in uppercase. C. An error will be generated stating that a database name must begin with an alphabet. D. An error will be generated stating that a database name should be a combination of numerals and alphabets.
A. A database will be created
What is the relationship between the foreign key and primary key? Each correct answer represents a complete solution. Choose all that apply. A. A foreign key constraint works in conjunction with a primary key constraint to enforce referential integrity among related entities. B. A foreign key ties attribute(s) of an entity to the primary key of another entity, for the purpose of creating a dependency. C. There is no relationship between a primary key and a foreign key. D. A foreign key and a primary key create a link between two entities.
A. A foreign key constraint works in conjunction with a primary key constraint to enforce referential integrity among related entities
Which of the following enables a user to use generic methods to access a database and to focus on the coding rather than the syntax for a specific database API? A. Abstraction B. Database security C. Native auditing D. Authentication
A. Abstraction
Remo works as a Database Designer for Tech Inc. He wants to create a table named Product. He issues the following query to create the Product table: CREATE Product ( ProductID Char (10) NOT NULL, OrderID Char (10) NULL ProductName Varchar NOT NULL, Primary key (OrderID, ProductID)) What are the errors in the above query? Each correct answer represents a complete solution. Choose two. A. An attribute declared as a primary key cannot contain NULL values. B. Each attribute should be defined as a primary key separately. C. A table cannot have two primary keys. D. ProductName is declared as Varchar without specifying the width of the column.
A. An attribute declared as a primary key cannot contain NULL values D. ProductName is decalred as Varchar without specifying the width of the column
Which of the following is a design of the user interface and the application programs that use and process the database? A. Application Design B. Object Modeling C. Database Design D. Database Planning
A. Application design
In addition to taking backups of your databases, you should also backup up files stated below. Which of these files store updates that have been made after the backup was made? A. Binary log files B. My.ini C. My.cnf D. Master.info
A. Binary log files
Which of the following is a management activity that allows the stages of the database application to be realized as efficiently and effectively as possible? A. Database planning B. Identifying information for objects C. Object identification D. Requirements collection and analysis
A. Database planning
You work as a Database Administrator for DataOneWorld Inc. Management instructs you to remove an object from the relational database management system. Which of the following statements will you use to accomplish the task? A. DROP B. SELECT C. CREATE D. ALTER
A. Drop
Which of the following steps in database planning helps to determine the requirements of the database through interviewing? A. Gathering information B. Identifying the relationship between objects C. Identify the objects D. Identifying the type of information for each objects E. Modeling the object
A. Gathering Information
Which of the following database terms is described in the statement below? "It prevents the current database operation from reading or writing a data item while the data item is being accessed by another operation." A. Lock B. Encryption C. Constraint D. Deadlock
A. Lock
You work as a Database Designer for DataOneWorld Inc. The company has a SQL Server database. You are assigned the task of creating a data model of an enterprise based on a specific data model. The model to be created should be independent of a particular DBMS. Which of the following database designs will help you accomplish the task? A. Logical database design B. Conceptual database design C. Physical database design D. Application design
A. Logical database design
You are taking back up of your MySQL database server. You need to take a back up of the file that has been created by the replication slave server and contains information needed for connecting to the master server. Which of the following files will you copy? A. Master.info B. My.ini C. Relay-log.info D. My.cnf
A. Master.info
Suzanne works as a Database Designer for DataOneWorld Inc. She is assigned the task of decomposing the components of a database, but she has to ensure that all the components are decomposed to only some extent. Which of the following approaches will she use to accomplish the task? A. Mixed approach B. Inside-out approach C. Top-down approach D. Bottom-up approach
A. Mixed approach
You have developed a stored procedure named usp_GetEmp that accepts an employee number as a parameter and retrieves the details about the employee from the CurrentEmp table of a database named Employees. You have tested it, and it works exactly as you expected. Later, another employee tries to use the stored procedure and receives the following error: "The SELECT permission was denied on the object 'CurrentEmp', database 'Employees.schema 'dbo' ". What should you do to resolve the problem? A. Modify usp_GetEmp to include the With Execute As Owner clause. B. Modify usp_GetEmp to include the With Execute As Caller clause. C. Grant the employee the SELECT permission on the CurrentEmp table. D. Grant the employee the SELECT permission on the Employees database.
A. Modify usp_GetEmp to include the With Execute As Owner clause.
Which of the following is the process of extracting trails on a regular basis so that they can be transferred to a designated security system where the database administrators do not have access? A. Native auditing B. Abstraction C. Database security D. Encryption
A. Native auditing
Smith works as a Database Administrator for DWorlds Inc. The management instructs him to plan a database where identifying the key objects or entities for database management is important. Which of the following database planning steps will help him to accomplish the task? A. Object identification B. Gathering information C. Identifying the relationships between objects D. Object modeling
A. Object identification
Which of the following are the characteristics of application design? Each correct answer represents a complete solution. Choose three. A. Output of the transaction B. Shortlisting of two or three products C. Data can be used from the transaction D. Expected rate of usage
A. Output of the transaction C. Data can be used from the transaction D. Expected rate of usafe
Which of the following is a building working model of a database system? A. Prototyping B. Bottom-up approach C. Conceptual database design D. Top-down approach
A. Prototyping
Mark works as a Database Administrator for DataWorld Inc. The company has a SQL Server database. Management instructs him to ensure that no inconsistent data is entered in the database. Which of the following will help him to accomplish the task? A. Referential integrity B. Abstraction C. Encryption D. Authentication E. Native auditing
A. Referential Integrity
Which of the following are the types of prototyping strategies? Each correct answer represents a complete solution. Choose two. A. Requirements prototyping B. Physical prototyping C. Revolutionary prototyping D. Evolutionary prototyping
A. Requirements prototyping D. Evolutionary prototyping
Which of the following are DML commands? Each correct answer represents a complete solution. Choose all that apply. A. SELECT INTO B. DELETE C. UPDATE D. ALTER E. SELECT F. INSERT
A. SELECT INTO B. DELETE C. UPDATE F. INSERT
Which of the following is an ANSI approved language for communicating and managing data in a relational database management system (RDBMS)? A. SQL B. QL C. DDL D. XML
A. SQL
You want to recover one or more tablespaces to a point in time older than the rest of the database. Which of the following are the recovery situations in which tablespace Point-in-Time Recovery (TSPITR) should be used? Each correct answer represents a part of the solution. Choose all that apply. A. To recover a tablespace that contains rollback segments. B. To recover a table that has become logically corrupted. C. To recover a DML statement that has affected only a subset of the database. D. To recover a tablespace on a very large database
A. To recover a tablespace that contains rollback segments. B. To recover a table that has become logically corrupted. C. To recover a DML statement that has affected only a subset of the database.
Which of the following are the main approaches in the database design? Each correct answer represents a complete solution. Choose three. A. Top-down approach B. Bottom-up approach C. Middle approach D. Inside-out approach
A. Top down approach B. Bottom up approach D. Inside out approach
Which of the following commands can be used to change the authorization type in DB2 9? Each correct answer represents a complete solution. Choose all that apply . A. UPDATE DATABASE CONFIGURATION B. SET AUTHORISATION C. RESET DATABASE CONFIGURATION D. UPDATE DBM CFG
A. UPDATE DATABASE AUTHORIZATION D. UPDATE DBM CFG
You manage a database named Exams accessed via a website. The website is regularly accessed by users in different countries. You are redesigning a table named History that records when users have purchased and taken online exams. You need one of the columns in the History table to record what time of day that a user has taken an exam. Additionally, you need this column to have time zone awareness. What data type should you use? A. datetimeoffset B. datetime C. Use two different columns with one column of datetime, and the second column indicating the UTC offset D. datetime2
A. datetimeoffset
Which of the following scripts is used to convert Unix-type zone files into SQL statements, and loads the time zone tables in a mysql database? A. mysql_tzinfo_to_sql B. mysql_time_to_sql C. mysql_timezone_to_sql D. mysql_tz_to_sql
A. mysql_tzinfo_to_sql
Which of the following values cannot be stored in a character column defined as the primary key of a table? A. null B. '0' C. 'null' D. ''
A. null
INSERT
Adds on or more new rows to a table or a view in SQL Server
SSMS Object Explorer
Allows users to browse select and manage any of the objects within the server
CREATE
Allows you to create a wide variety of database objects, including tables, views, and stored procedures
Data Type:
An attribute that specifies the type of data an object can hold, as well as how many bytes each data type takes up
Database
An organized collection of data, typically stored in an electronic format. Allows you to input, organize, and retrieve data quickly. Organized traditionally by fields, records, and files
John works as a Database Administrator for Bluewell Inc. The company has a SQL Server database. A table in the database has a candidate key and an attribute that is not a constituent of the candidate key. The non-key attribute depends upon the whole of the candidate key rather than just a part of it. Which of the following normal forms is represented in the scenario? A. 4 NF B. 2 NF C. 1 NF D. 3 NF
B 2NF
You work as a Database Designer for Netwell Inc. The database has a table named Project, which is depicted below: ProjectID ProjectName TaskID TaskName A Macwell Design A Macwell Coding B Vintech Design B Vintech Coding Is the table given above in normalized form? If not, then which normal form (NF) is violated? A. The table is in normal form, as each cell contains only one value. B. 3NF C. 1NF D. 2NF
B. 3NF D. 2NF
You work as a database developer for www.company.com.com. The company has a database named www.company.com that is hosted on a SQL Server 2008 server. The database includes a table named Employees, which contains the details of the employees. You want to ensure that anytime any data in the Employees table is modified with an UPDATE statement, they are recorded in a table named EmployeeChanges. The EmployeeChanges table includes columns to record what the change was, who made the change, and when they made the change. What should you create to meet this need? A. A DDL trigger that queries the updated table B. A DML trigger that queries the inserted table C. A DDL trigger that queries the inserted table D. A DML trigger that queries the updated table
B. A DML trigger that queries the inserted table
You work as a Database Administrator for Bell Ceramics Inc. An employee of the company has fired a query, including a DML statement, such as INSERT, against a table named Sales. You notice that the DML statement has not executed. What will you do to resolve the issue? Each correct answer represents a complete solution. Choose two. A. Clean up all the uncommitted transactions on the Sales table. B. Add more space to the tablespace and increase the users quota on the tablespace. C. Provide redundant network paths from the client computer to the server along with additional listener connections on the Oracle server and redundant network cards on the Oracle server. D. Provide an appropriate privilege or create views on the Sales table, and grant privileges on the view.
B. Add more space to the tablespace and increase the users quota on the tablespace D. Provide an appropriate privilege or create views on the Sales table, and grant privileges on the view
You are a database developer for a database named Customers hosted on a SQL Server 2008 server. Recently, several customers were deleted from the Customers database. To ensure this is not repeated in future, you have decided to create a DML trigger to prevent it. What code will create the trigger to meet your goals? Each correct answer represents a complete solution. Choose all that apply. A. CREATE TRIGGER trgDeleteCustomer ON dbo.Customers BEFORE DELETE AS RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK TRANSACTION B. CREATE TRIGGER trgDeleteCustomer ON dbo.Customers AFTER DELETE AS RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK TRANSACTION C. CREATE TRIGGER trgDeleteCustomer ON dbo.Customers AFTER DELETE AS IF (SELECT COUNT(*) FROM DELETED) > 1 BEGIN RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK TRANSACTION END D. CREATE TRIGGER trgDeleteCustomer ON dbo.Customers AFTER DELETE AS IF (SELECT COUNT(*) FROM DELETED) > 0 BEGIN RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK TRANSACTION END
B. CREATE TRIGGER trgDeleteCustomer ON dbo.Customers AFTER DELETE AS RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK TRANSACTION D. CREATE TRIGGER trgDeleteCustomer ON dbo.Customers AFTER DELETE AS IF (SELECT COUNT(*) FROM DELETED) > 0 BEGIN RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK TRANSACTION END
QUESTION 79 Peter works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database. Peter has to construct an Entity-Relationship schema design for the data he will use in the database. Which of the following database designs will he use to accomplish the task? A. Physical database design B. Conceptual database design C. Logical database design D. Application design
B. Conceptual database design
Which of the following is used to give a default value to a column if the value for that column is unknown? A. Concurrency B. DEFAULT constraint C. Nested transaction D. Transaction
B. DEFAULT constraint
You work as a Database Administrator for InfoTech Inc. The company has a database and they want you to create a design for a database that will support the enterprise's operations and objectives. Which of the following will you use to accomplish the task? A. Application design B. Database design C. Database planning D. Requirements collection and analysis
B. Database Design
Your Company is designing and developing a number of databases for a stock exchange. One of the databases will contain highly sensitive data for which high level of security will be required. Although high processing speed is one of the prime requirements of the customer, for this database, security of the data will take priority over the processing speed. It needs to be ensured that even if unauthorized access to the database is obtained, the rogue user is unable to read the data. Which of the following protection techniques will you suggest for this database? A. Authentication B. Encryption C. Native auditing D. Integrity controls
B. Encryption
You manage a database named Customers, which includes a table named Orders. The Orders table is frequently queried, but only orders with a sales total of more than $1000.00 are required in the query. You want to create an index to speed up these types of queries at the same time, ensuring the index is as small as possible. What type of index should you use? A. Non-clustered B. Filtered C. Clustered D. XML Correct Answer: B
B. Filtered
Linda works as a Database Designer for Lion Inc. She has been given an assignment to design the database of a publishing company. The database has a table named Author, which has a composite key, AuthorID and TitleID. Royalty and LiteraryAgent are the other attributes. The functional dependencies are such that AuthorID + TitleID-> Royalty (i.e. Royalty is functionally dependent on AuthorID and TitleID) and AuthorID-> LiteraryAgent (i.e. LiteraryAgent is functionally dependent on AuthorID). Which of the following is true about this table? A. It violates 4NF. B. It violates 2NF. C. It violates 1NF. D. There is no violation.
B. It violates 2NF
James works as an Administrator for Softech Inc. The company has a SQL Server 2005 computer named SQL1. The company has six departments; Accounting, Sales, Marketing, Manufacturing, Production, and Research. The user accounts of each department are located in a domain group named after the department. James wants to create a separate database on SQL1 for each department which will store the department related information. Users in each department must be able to read and update data in the database belonging to their respective departments. No user must be able to access the database belonging to another department. James wants to configure access to the database to meet these requirements. What should James do to accomplish the task? A. James should create a Windows Authentication login for each domain group and configure the logins as database users for the appropriate database. Add each database user to the db_ddladmin database role. B. James should create a Windows Authentication login for each domain group and configure the logins as database users for the appropriate database. Add each database user to the db_datareader and db_datawriter database roles. C. James should create a Windows Authentication login for each domain user and configure the logins as database users for the appropriate database. Add each database user to the db_ddladmin database role. D. James should create a Windows Authentication login for each domain user and configure the logins as database users for the appropriate database. Add each database user to the db_datareader and db_datawriter database roles
B. James should create a Windows Authentication login for each domain group and configure the logins as database users for the appropriate database. Add each database user to the db_datareader and db_datawriter database roles.
Consider the case of a fruit juice company. The company manufactures fruit juices and supplies them to wholesalers. The Database Designer creates a table named Production. The code is given below: 1. CREATE Table Production 2. 2.(Fruit_type VarChar, 3. Fruit_name Char(20), 4. Quantity Int(3)) Which of the above-mentioned lines has an error? A. Line 3 B. Line 2 C. Line 1 D. Line 4
B. Line 2
You are a Database Administrator of MySQL database. Few days back, your server crashed. Now, it is up and online. You need to check the integrity of various tables used in the database. You need to issue the CHECK TABLE command. For which of the following tables will this command work? Each correct answer represents a complete solution. Choose two. A. FEDERATED B. MyISAM C. MERGE D. InnoDB
B. MyISAM D. InnoDB
JDBC API 2.0 defines five levels of transaction isolation for database concurrency control. Which of the following is the lowest level of transaction isolation? A. TRANSACTION_SERIALIZABLE B. TRANSACTION_NONE C. TRANSACTION_READ_COMMITTED D. TRANSACTION_READ_UNCOMMITTED E. TRANSACTION_REPEATABLE_READ
B. TRANSACTION_NONE
Which of the following commands cannot be rolled back? Each correct answer represents a complete solution. Choose two. A. DELETE B. TRUNCATE C. UPDATE D. COMMIT
B. TRUNCATE D. COMMIT
Which of the following statements about external tables is true? A. They can have constraints or triggers. B. They cannot be written to with DML commands. C. They can have indexes. D. They cannot be used in joins, views, and subqueries.
B. They cannot be written with DML commands
Which of the following DML SQL statements support usage of correlated sub-queries? Each correct answer represents a complete solution. Choose all that apply. A. INSERT B. UPDATE C. DELETE D. SELECT
B. UPDATE C. DELETE
Which of the following statements about rebuilding an index is true? A. The NOLOGGING and ONLINE keywords can never be used together. B. Without the ONLINE keyword the index is locked for any DML operation. C. The NOLOGGING and ONLINE keywords are always used together. D. Without the ONLINE keyword the index is locked for the SELECT operation.
B. Without the ONLINE keyword the index is locked for any DML operation
Consider the case of a distance education university. The university has many regional centers across the country. Each regional center has a head known as regional manager. Each regional center has allotted more than one study center in its region. Each regional center has a region code, which is unique and specifies a region. Each study center also has a study center code, which is also unique. What is the relationship between regional center and study center? A. One-to-one B. One-to-many C. There is no relationship. D. Many-to-many
B. one to many
You manage a large database named Sales. The Sales database contains a table named OrderDetails, which is a heavily transacted table with frequent inserts. Indexes in the table often become fragmented due to excessive page splitting. You want to minimize the amount of fragmentation due to page splits. What should you do? A. Update the statistics on the indexes. B. Change the fillfactor for the indexes to 100. C. Change the fillfactor for the indexes to 60. D. Change the fillfactor for the indexes to 0
C. Change the fillfactor for the indexes to 60.
Mark works as a Database Administrator for DataOneWorld Inc. Management instructs him to provide an additional security layer to the database to prevent unauthorized viewing of data with the help of an algorithm called cipher. Which of the following will help him to accomplish the task? A. Native auditing B. Authentication C. Encryption D. Abstraction
C. Encryption
You are the database administrator of a MySQL server that runs on a Windows server. All clients are local clients. For security, you want to disable connections from the remote clients. Which of the following steps will you take to accomplish the task? A. Start the server with the --disable-networking option. B. Start the server with the --shared-memory option. C. Start the server with the --skip-networking option. D. Start the server with the --secure-auth option.
C. Start the server with the --skip-networking option.
What is the ideal time to back up dynamic log files? A. When the server is running. B. You can back up dynamic log files any time. C. When the server is stopped. D. When the server is shut down.
C. When the server is stopped
Which of the following can be used to populate a table? Each correct answer represents a complete solution. Choose all that apply A. Data Pump B. SQL*Loader C. INSERT statement D. MERGE statement
CBAD
ALTER
Changes an existing object; you can use it to add or remove columns from a table
UPDATE
Changes existing data in one or more columns in a table a view
USE
Changes the database context to the specified database or database snapshot
Mark works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database. Management instructs him to verify the identity of a user or software that is connecting to the database. Which of the following will help him to accomplish the task? A. Referential integrity B. Abstraction C. Encryption D. Authentication
D. Authentication
Which of the following is the process of creating a design for the database that will support the enterprise's operations and objectives for the required database system? A. Identifying relationships between objects B. Application design C. Database planning D. Database design
D. Database design
Which of the following provides reliable units of work that allow correct recovery from failures and keeps a database consistent even in cases of system failure? A. Database security B. Concurrency control C. Two-phase commit D. Database transaction
D. Database transaction
Which of the following statements is true about referential integrity? A. It checks that no component of a primary key can have a null value and no duplicate entries can exist. B. It checks that the value of a primary key must be consistent throughout the life of an instance. C. It distinguishes between null values and zero entries. D. It checks that no record in a child table can exist if its corresponding record is not available in the parent table
D. It checks that no record in a child table can exist if its corresponding record is not available in the parent table
Which of the following steps in database planning is used to record an object so that it is represented visually in the system? A. Identifying the relationships between objects B. Gathering information C. Object identification D. Object modeling
D. Object modeling
You work as a MySQL Database Administrator. Your server crashed and it was recovered and made online within half an hour. What will you do to ensure that the table structure and contents are in a proper state? A. Perform a table optimization operation. B. Perform a table repair operation. C. Perform a table analysis operation. D. Perform a table check operation
D. Perform a table check operation
John works as a database designer in ABC Tech. He wants to produce a description of a database implemented on secondary storage media. Which of the following designs will he implement to accomplish the task? A. Logical database design B. Conceptual database design C. Database design D. Physical database design
D. Physical database design
John works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database. John wants to insert records in a table where the database is structured in a fixed format. Which of the following data models will he use to accomplish the task? A. Object relational data model B. Entity-Relationship Model C. Network data model D. Relational mode
D. Relational Model
A company named Rel Inc. has many authorized dealers across the country who sell their products. The Sales Manager of the company wants to see the details of the authorized dealers, including the name, region, and total sales in ascending order of sales. Which of the following queries should be issued to get the desired output? A. SELECT MAX (Totalsales) FROM Dealer B. SELECT FROM Dealer C. SELECT * FROM Dealer WHERE MAX (Totalsales) D. SELECT Name, Region, Totalsales FROM Dealer ORDER BY Totalsales
D. SELECT Name, Region, Totalsales FROM Dealer ORDER BY Totalsales
You are the database administrator for a MySQL database. The database server is installed on a Unix system. The time zone files for the system are located at /usr/share/zoneinfo. You need to ensure that the system and MySQL time zones are based on the same information. Which of the following statements will you use to accomplish the task? A. shell> /ust/share/zoneinfo mysql_tzinfo_to_sql | mysql -u root mysql B. shell> /ust/share/zoneinfo mysql_tz_to_sql | mysql -u root mysql C. shell> mysql_tz_to_sql /ust/share/zoneinfo | mysql -u root mysql D. shell> mysql_tzinfo_to_sql /ust/share/zoneinfo | mysql -u root mysql
D. shell> mysql_tzinfo_to_sql /ust/share/zoneinfo | mysql -u root mysql
First Normalized Form (1NF)
Data is in an entity format - Table must have no duplicate records, once you have defined a primary key for the table, you have met the first normalized form criterion - The table also must not have multivalued attributes, meaning you can't combine in a single column multiple values that are considered valid for a column - Entries in the column or attribute must be of the same data tyoe
You work as the Database Administrator for a MySQL database server. In an hour or so, you are able to bring a corrupted server online. You execute the CHECK TABLE command and find that some of the InnoDB tables need to be repaired. You restart the server and discover that auto-recover has failed. Which of the following steps will you take to recover the corrupted InnoDB tables? A. Run the ANALYZE TABLE command. B. Run the REPAIR TABLE command. C. Recover the tables from the last backup. D. Run the OPTIMIZE TABLE command. E. Restart the server with the innodb_force_recovery option.
E. Restart the server with the innodb_force_recovery option.
Normalization Forms:
First Normalization Form (1NF): Eliminate repeating groups Second Normalization Form (2NF): Eliminate redundant data Third Normalization Form (3NF): Eliminate columns not dependent on key Fourth Normalization Form (4NF): Isolate independent multiple relationships Fifth Normalization Form (5NF): Isolate semantically related multiple relationships
Flat-Type Database Example
ID Customer Order 1 Allen pens 2 Smith ink 3 Alex paper
Query
Inquiry into the database that returns information back from the database
Contstraints
Limitations or rules placed on a field or column to ensure that data that is considered invalid is not entered Ex: Age must be a positive number
MERGE
Performs insert, update, or delete operations on a target table based on the results of join with a source table
Fill in the blank with the appropriate word. The _________ model for database management is a database model based on first-order predicate logic.
Relational
DROP
Removes an object from a database, but if other objects are dependent on the object you are attempting to remove, this statement will fail and an error will be raised
DELETE
Removes rows from a table or view
SELECT
Retrieves rows from the database and enables the selection of one or many rows or columns from one or many tables in the SQL Server
Database Servers
Servers that store databases so they can be accessed by multiple users and provide a high level of performance
Relational Database
Similar to a hierarchical database in that data is stored in tables and any new info is added into the table without having to reorganize the table itself. Can have multiple parents
Hierarchical Database
Similar to a tree structure. Each "parent" table can have multiple "children" but each child can have only one parent
Flat Type Database
Simplistic in design, most commonly used in plain text formats, used to hold one record per line, make access/performance/and queries very quick. Example: what you would find in a .txt or .ini file
Data Manipulation Language (DML)
The language element that allows you to use the core statements INSERT, UPDATE, DELETE, and MERGE to manipulate data in any SQL Server tables. Core DML statements include: SELECT INSERT UPDATE DELETE MERGE
Transact SQL
The primary means of programming and managing SQL Server. Exposes keywords so that you can create and manage databases and their components and monitor and mange the server itself When you use SSMS to perform an action or task you are executing transact SQL commands
SQL Server Management Studio (SSMS)
The primary tool for managing the server and its databases using a graphical interface. Can be used to view and optimize database performance, as well as to create and modify databases tables, and indexes
Normalization
The process of organizing data in order to reduce redundancy by dividing a database into two or more tables and then defining table relationships
TRUNCATE
Used to both delete the rows from a table and free the space containing the table
DELETE
Used to delete rows from a table, but it does not free the space containing the table