RAID stands for redundant array of inexpensive disks, used to provide fault tolerance to database servers. There are six RAID levels 0 through 5 offering different levels of performance, fault tolerance.
Lock escalation is the process of converting a lot of low level locks (like row locks, page locks) into higher level locks (like table locks).Every lock is a memory structure too many locks would mean, more memory being occupied by locks.
In logshipping the transactional log file from one server is automatically updated in backup database on the other server and in the case when one server fails the other server will have the same DB and we can use this as the DDR (disaster recovery) plan.
Dirty pages are data pages that have been entered into the buffer cache and modified, but not yet written to the disk.
Check point writes all dirty pages for the current database to disk.
There are 3 database files in sql server 2000.
They are:
No, Log file is a never part of file group.
The recovery models in sql server 2000 are:
Microsoft SQL Server is a relational model database server produced by Microsoft. Its primary query languages are T-SQL and ANSI SQL.
Extent is a collection of 8 sequential pages.
There are 2 types of extents.
Snapshot replication distributes data exactly as it appears at a specific moment in time and does not monitor for updates to the data. Snapshot replication is best used as a method for replicating data that changes infrequently or where the most up-to-date values (low latency) are not a requirement. When synchronization occurs, the entire snapshot is generated and sent to Subscribers.
Transactional replication, an initial snapshot of data is applied at Subscribers, and then when data modifications are made at the Publisher, the individual transactions are captured and propagated to Subscribers.
Merge replication is the process of distributing data from Publisher to Subscribers, allowing the Publisher and Subscribers to make updates while connected or disconnected, and then merging the updates between sites when they are connected.
A transaction is a logical unit of work in which, all the steps must be performed or none.
The default system databases in sql server 2000 are:
You can find out the install paths from the registry key corresponding to each instance. The following registry key contains the required information:
HKEY_LOCAL_MACHINE /Software /Microsoft SQL Server /{Instance Name} /MSSQLServer /Setup /SQLpath.
There are two ways to install the Client tools:
In this situation, minimize the Setup window (and other windows if necessary) to see whether there are any message boxes relating to File Copy or File Sharing. You must respond to any such messages before Setup can proceed.
If you are planning to install identical installations of SQL Server 2000 on several computers, or if you need to install SQL Server 2000 on computers that you cannot administer remotely, you can use the unattended install option. The most important component of an unattended install is the setup initialization file. The setup initialization file can be obtained in any of the following ways:
After you have the .iss file, you can perform the unattended install by starting the Setupsql.exe program with the appropriate parameters.
8060 bytes.
Alter database [Database name] set recovery full
Go.
SQL Server 2000 clustering does not provide load balancing; it provides failover support. To achieve load balancing, you need software that balances the load between clusters, not between servers within a cluster.
A collation specifies the bit patterns that represent each character and the rules by which characters are stored and compared.
Address Windowing Extensions API is commonly known as AWE. AWE is used by SQL Server when it has to support very large amounts of physical memory. AWE feature is only available in SQL Server Enterprise, Standard, and Developer editions with of SQL Server 32 bit version.
ACID (an acronym for Atomicity Consistency Isolation Durability) is a concept that Database Professionals generally look for when evaluating databases and application architectures. For a reliable database all this four attributes should be achieved.
File group is a group of files logically grouped together.
There are two types of filegroups:
The names of all SQL Server instances on a computer can be found from the Installed Instances value which is located under the following registry key:
HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Microsoft SQL Server.
Once data is stores in memory user can make changes to that a log file is generated. This log file is generated in every five minutes of transaction is done. After this sql server writes changes to database with the help of transaction log files. This is called Write-ahead log.
To determine the service pack that installed on your sql server ,connect to your server ,execute the command:
Select @@version Go.
sp_renamedb ‘oldname’, ‘newname’.
SQL Server 2000 is available in seven different editions. They are:
Yes, For a successful installation, follow these steps:
Workload governor limits the performance of SQL SERVER Desktop engine (MSDE). Workload governor sits between the client and the database engine and counts the number of connections per database instance. If Workload governor finds that the number of connections exceeds eight connections, it starts stalling the connections and slowing down the database engine.