A: DBCC DBREINDEX
B: SELECT * FROM sys.dm_db_index_physical_stats
C: DBCC INDEXDEFRAG
D: SELECT * FROM sys.indexe
举一反三
- You are a database administrator for your company. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use?() A: DBCC DBREINDEX B: SELECT * FROM sys.dm_db_index_physical_stats C: DBCC INDEXDEFRAG D: SELECT * FROM sys.indexes
- You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which is named Instance01. Instance01 contains a database which is named SellingHelp. There isthe Products table in the SellingHelp database. Now according to the company requirement, the Products table has to be replicated to the SQL Server instances installed in laptopscomputers. You have to create a Replication topology to perform this. The Products table is updated from Instance01 when the laptops reconnect to the corporate network. The Products table on Instance01 is frequently updated between reconnections. You must make sure that you can implement the Replication topology along with the Subscription type successfully and meanwhile reduce the bandwidth usage to the least. So what action should you perform to achieve this goal?() A: You should implement the Snapshot Replication topology along with a Push Subscription. B: You should implement the Merge Replication topology along with a Pull Subscription. C: You should implement the Snapshot Replication topology along with a Pull Subscription. D: You should implement the Transactional Replication topology along with a Pull Subscription
- You have a computer that runs Windows 7. You manually create a system restore point. You need torestore a copy of a file stored on drive C from two days ago. You must achieve this goal in the minimumamount of time. What should you do?() A: From Recovery, select System Restore. B: From Backup and Restore, select Restore my files. C: From the command prompt, run Wbadmin get items. D: From the properties of the file, select Previous Versions.
- The first time you use a database you should assess its _____________.
- You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?() A: affinity mask B: affinity I/O mask C: max degree of parallelism D: optimize for ad hoc workload
内容
- 0
You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?() A: affinity mask B: affinity I/O mask C: max degree of parallelism D: optimize for ad hoc workloads
- 1
You configure your database Instance to support shared server connections.Which two memory areas that are part of PGA are stored in SGA instead, for shared server connection?() A: User session data B: Stack space C: Private SQL area D: Location of the runtime area for DML and DDL Statements E: Location of a part of the runtime area for SELECT statement
- 2
If you _____ your house or land, you use it as a guarantee to a company in order to borrow money from them.
- 3
You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure thatyou minimize the usage of memory space and processor time. Which encryption type should you use?() A: Symmetric key encryption B: Asymmetric key encryption C: Certificate-based encryption D: Transparent data encryption
- 4
How to select examples? The examples you use to develop the thesis statement should be________________.