Win Surprise Gifts!!!
Top 5 Contributors of the Month
Post New Question
Subscribe to Interview Questions
Database:List step to be performed to work with
Posted By :
Posted Date :
July 26, 2011
Declare cursor,Open cursor,Fetch row from cursor,process fetched row,close cursor, deallocate cursor
You can also find related Interview Question to
Database:List step to be performed to work with cursor?
You work for a bank that uses a SQL Server 2005 database to store line items from customer banking transactions. The bank processes 50,000 transactions every day. The application requires a clustered index on the TransactionID column. You need to create a
table that supports an efficient reporting solution that queries the transactions by date.What are the two ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Place a nonclustered index on the date column.
B. Add a unique clustered index on the date column
C. Map each partition to a filegroup, with each filegroup accessing a different physical
D. Create a partitioning scheme that partitions the data by date.
It is a object that manipulate data in a set row by row.
Database: List different types of joins.
Inner join, Outer join, Self join
Database: List different types of outer joins.
Left outer join, right outer join, full outer join
Database Concurrency in Sql Server.
When two or more user try to update same type of data in a table then Database Concurrency helps in this situation.
There are 2 types of Database Concurrency
Pessimistic: When one user try to change the data with pessimistic concurrency then a lock is placed on the data in a table so that another user cannot change data. when one user finishes then other user can able to change.
Optimistic: When two user works on the same data in a table and one change that data first then second user cannot change that same data becasue the which he have using is allready changed so he cannot do the change becasue change apply to another data that is changed by first user.
How does CAS work?
The CAS security policy revolves around two key concepts - code groups and permissions. Each .NET assembly is a member of a particular code group, and each code group is granted the permissions specified in a named permission set.
For example, using the default security policy, a control downloaded from a web site belongs to the 'Zone - Internet' code group, which adheres to the permissions defined by the 'Internet' named permission set. (Naturally the 'Internet' named permission set represents a very restrictive range of permissions.)
List out the areas in which data structures are applied extensively?
3.Database Management System,
4.Statistical analysis package,
If you are using C language to implement the heterogeneous linked list, what pointer type will you use?
The heterogeneous linked list contains different data types in its nodes and we need a link, pointer to connect them. It is not possible to use ordinary pointers for this. So we go for void pointer. Void pointer is capable of storing pointer to any type as it is a generic pointer type.
Which is the subset of SQL commands used to manipulate Oracle Database structures, including tables?
Data Definition Language (DDL)
What is a Database system?
The database and DBMS software together is called as Database system.
List the Coffman's conditions that lead to a deadlock.
1. Mutual Exclusion: Only one process may use a critical resource at a time.
2. Hold & Wait: A process may be allocated some resources while waiting for others.
3. No Pre-emption: No resource can be forcible removed from a process holding it.
4. Circular Wait: A closed chain of processes exist such that each process holds at least one resource needed by another process in the chain.
What is Cursor?
Cursor is a database object used by applications to manipulate data in a set on a row-by-row basis, instead of the typical SQL commands that operate on all the rows in the set at one time.
In order to work with a cursor we need to perform some steps in the following order:
. Declare cursor
. Open cursor
. Fetch row from the cursor
. Process fetched row
. Close cursor
. Deallocate cursor
Disadvantage of Cursor ?
Cursor plays there row quite nicely but although there are some disadvantage of Cursor .Because cursor doing roundtrip it will make network line busy and also make time consuming methods. First of all select query gernate output and after that cursor goes one by one so roundtrip happen.
Another disadvange of cursor are ther are too costly because they require lot of resources and temporary storage so network is quite busy.
What is a cursor?
A cursor is used to access the result set stored in the memory on execution of a query. It is a special programming construct that allows data to be manipulated on a row-by-row basis. They point to a certain location within a record set and allow the operator to move forward (and sometimes backward, depending upon the cursor type) through the results one record at a time
Quick Links For Interview Questions Categories:
Find questions, FAQ's and their answers related to .NET, C#, Vb.Net, Sql Server and many more.
Now you can find lots of .NET, C#, Vb.Net, SQL Server,Windows, ASP.Net related Questions and their Answers here at www.dotnetspark.com. Our aim is to help you pass your certification Exams (MCP, MCSD, MCAD etc.,) with flying scores and get good name in your company.
So, Start looking our
section daily and improve your .NET Skills. You can also help others by posting Interview Questions and their Answers in this section.
Hall of Fame
Terms of Service
Tell A Friend