Anda di halaman 1dari 12

LOVELY PROFESSIONAL UNIVERSITY INT401: DATABASE ADMINISTRATION School: LIE Name of the faculty member: Vasudha Ranchal Section:

KE179 Max. Marks: 05 DOA: 24 January, 2012 DOS: 09 February, 2012 Department: CSE/IT

Part A
1. A big reason for the locking away of the system objects is because they all have a

common source now called the Resource database. Comment on statement giving appropriate explanation of its significance to SQL Server 2005. Ans: A big reason for the locking away of the system objects is because they all have a common source now called the Resource database. The resource database is the physical repository for all system objects and is inaccessible during normal operations of SQL Server. Although the system objects are physically stored in resource database, they are logically presented as the SYS schema in each database. The Resource database makes upgrading to a new version of SQL Server an easier and faster procedure. In earlier versions of SQL Server, upgrading required dropping and creating system objects. Because the Resource database file contains all system objects, an upgrade is now accomplished simply by copying the single Resource database file to the local server. Similarly, rolling back system object changes in a service pack only requires overwriting the current version of the Resource database with the older version. Microsoft strongly recommends that resource database be left alone, but it can be accessed if SQL Server is strated in single-user mode. Even this access, however, is read-only, as is access to ny objects in the SYS schema. Persisting all the system objects in the resources database allow rapid deployment of services packs and upgrades to SQL Sever 2005. Whem installing a service pack, the process is simply one of replacing the resource database with a new version and executing whatever modificaton are requried to the operating system objects.

2. SQL Server 2005 can be called as the Enterprise Data Platform. Justify this statement. Ans: Enterprise Data Platform is a framework in SQL Server which offers

Secure, trusted platform for your data Optimized and predictable system performance Productive policy-based management of your infrastructure Secure, trusted

platform for your data To secure, trusted platform for your data, SQL Server 2005 offers

Transparent Data Encryption Encrypt your data without requiring an application rewrite External Key Management Consolidate security keys within the data center Data Auditing - Integrated auditing support Pluggable CPU - Add system resources without affecting your users Enhanced Database Mirroring - Leverage database mirroring to increase reliability

To Increase the reliability of your applications SQL Server 2005 offers

Optimized and predictable system performance Better Performance Optimize System Performance Predictable Performance Spend less time on ongoing operations Integrated with your enterprise system management

Productive policy-based management of your infrastructure

3. A relational database management system (RDBMS) is a database management

system (DBMS) that is based on the relational model give comments on this statement, and briefly explain what you understand by term RELATIONAL MODEL?. RDBMS is related to mathematical relations also as compared to DBMS. Give your comment in favor or disagreements of this statement. Ans: A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model as introduced by E. F. Codd. Most popular commercial and open source databases currently in use are based on the relational database model. One well-known definition of what constitutes a relational database system is Codd's 12 rules. However, many of the early implementations of the relational model did not conform to all of Codd's rules, so the term gradually came to describe a broader class of database systems. At a minimum, these systems:

presented the data to the user as relations (a presentation in tabular form, i.e. as a collection of tables with each table consisting of a set of rows and columns, can satisfy this property) provided relational operators to manipulate the data in tabular form

The Relational Model is a clean and simple model that uses the concept of a relation using a table rather than a graph or shapes. The information is put into a grid like structure that consists of columns running up and down and rows that run from left to right, this is where information can be categorized and sorted.

Here is a small example of the grid like Relational Model:

The Relational Model can often also include concepts known commonly as foreign keys, foreign keys are primary keys in one relation that are kept in another relation to allow for the joining of data. Relational database theory uses a set of mathematical terms, which are roughly equivalent to SQL database terminology. The table below summarizes some of the most important relational database terms and their SQL database equivalents.

4. Is it true to say that different databases systems can only be differentiated on the basis

of their components? Explain briefly any two of the database systems. ANS Ans: Yes, Different databases have their own components for performing different applications. Oracle, sql server db2 etc are the databes packages that contain some set of features which are common in all and other feature that distinguishes it from other. Architecture of oracle: The Oracle Relational Database Management System, or RDBMS, is designed to allow simultaneous access to large amounts of stored information. The RDBMS consists of the database (the information) and the instance (the embodiment of the system). The database contains the physical files that reside on the system and the logical pieces such as the database schema.

The Physical Layer: The physical layer of the database consists of three types of files: One or more datafilesTwo or more redo log filesOne or more control files-

The Logical Layer: The logical layer of the database consists of the following elements:

One or more tablespaces. The database schema, which consists of items such as tables, clusters, indexes, views, stored procedures, database triggers, sequences, and so on.

The Oracle Memory Structure

Oracle Processes Server Processes (Shadow Processes)

Background Processes

Architecture of SQL SQL Server is stored in databases. The data in a database is organized into the logical components visible to users. A database is also physically implemented as two or more files on disk.

Each instance of SQL Server has four system databases (master, model, tempdb, and msdb) and one or more user databases. Some organizations have only one user database, containing all the data for their organization. Some organizations have different databases for each group in their organization, and sometimes a database used by a single application.

SQL Server allows you to detach databases from an instance of SQL Server, then reattach them to another instance, or even attach the database back to the same instance. If you have a SQL Server

database file, you can tell SQL Server when you connect to attach that database file with a specific database name.

PART B 5. With reference to the SQL Server 2005 Application, elaborate the following: The setup application asks for the instance information. How can the instance be provided? Explain various instances used in this application. Ans: An SQL Server instance is a complete SQL server. SQL Server (service) can be installed multiple times on the same computer. Each installation is called an 'Instance'. When you install SQL Server each time, a new windows service is installed. You can install either a named instance or a default instance. An SQL Server instance has its own copy of the server files, databases and security credentials. The advantage is that since some of the files that run the Instance are duplicated, you can apply service packs separately to each Instance. That way you can host several applications on the same hardware that require different service pack levels. The default instance takes on the name of the machine where SQL Server is being installed. There can be only one default instance. When applications specify only the computer name in their requests to connect to SQL Server, the SQL Server client components attempt to connect to the default instance of the database engine on that computer. However, SQL Server 2005 supports up to 50 instances of SQL Server to be installed on a single machine. If there is a default instance, a maximum of 49 named instances can be configured. If no default instance is installed, 50 named instances can be configured. All instances of the database engine other than the default instance are identified by an instance name specified during installation of the instance. Applications must provide both the computer name and the instance name of any named instance to which they are

attempting to connect. The computer name and instance name are specified in the format computer_name\instance_name.

6. The setup application various built-in Service Accounts. Work out the justification

stating explanation of these accounts. Ans:Service Account provides the functionality to specify credentials for SQL Server services and their startup behaviors. For security reasons, you should be aware of the different accounts and their default user privileges. It can be a security risk to change the identity of a worker process so that it runs as an account with a high level of access.You can choose the option Use the built-in System account to specify Local System, Network Service or Local Service. In a production environment or certain development environments, it may be desirable to change this to a domain user account, but this is not usually necessary for local developer installations. Local System It has a high level of access privileges. A part of the Administrators group. If a worker process identity runs as the Local System user account, that worker process has full access to the entire system. Network Service It has fewer access privileges on the system than the Local System user account, but the is still able to interact throughout the network with the credentials of the computer account. It acts as the computer on the network. Local Service The built-in Local Service user account has fewer access privileges on the computer than the Network Service user account. Those user privileges are limited to the local computer.

It use the Local Service user account if the worker process does not require access outside the server on which it is running.

7. SQL Server 2005 Analysis Services (SSAS) delivers online analytical processing

(OLAP) and data mining functionality. Work out justification. Ans: SQL Server 2005 Analysis Services (SSAS) delivers online analytical processing (OLAP) and data mining functionality through a combination of server and client technologies, further reinforced through the use of a specialized development and management environment coupled with a well-defined object model for designing, creating, deploying, and maintaining business intelligence applications. The server component of Analysis Services is implemented as a Microsoft Windows service. Clients communicate with Analysis Services using the public standard XML for Analysis (XMLA), a SOAP-based protocol. Let us see the enhancements of made to SSAS. Supports up to 16 instances of Analysis Services Service. As discussed above, the Analysis Services service fully implements the XML for Analysis (XMLA) 1.1 specification. All communication with an instance of Analysis Services is handled through XMLA commands in SOAP messages. Uses the Proactive caching.

8. Illustrate the concept of Full Text Search? How does it get implemented in SQL

server 2005? Ans: Full-text search allows fast and flexible indexing for keyword-based query of text data stored in a Microsoft SQL Server database. In contrast to the LIKE predicate which only works on character patterns, full-text queries perform linguistic searches against this data, by operating on words and phrases based on rules of a particular language. Implement Full Text Search in Database 1. Determine the tables that requires full text search capabilities. 2. Ensure these table have a single column unique key 3. Determine the column that need full text search capabilities 4. Create a directory to store the full text catalog 5. Create a full text catalog 6. Create a full text index 7. Populate the full text index 8. Maintain the full text index

Anda mungkin juga menyukai