Sql Interview Question and Answers:
25. Define data model?
Underlying the structure of the database is called as data model.
26. What is an Entity?
It is a 'thing' in the real world with an independent existence.
27. What is BCP? When does it used?
BulkCopy is a tool used to copy huge amount of data from tables and views. BCP does not copy the structures same as source to destination.
28. Explain the use of the by GROUP BY and the HAVING clause?
The GROUP BY partitions the selected rows on the distinct values of the column on which the group by has been done.
The HAVING selects groups which match the criteria specified.
29. What is DataWarehousing?
According to Bill Inmon, known as father of Data warehousing. “A Data warehouse is a subject oriented, integrated ,time variant, non volatile collection of data in support of management’s decision making process”.
30. What are the advantages of Database?
Redundancy can be reduced
Inconsistence can be avoided
The data can be shared
Standards can be enforced
Security can be enforced
Integrity can be maintained
25. Define data model?
Underlying the structure of the database is called as data model.
26. What is an Entity?
It is a 'thing' in the real world with an independent existence.
27. What is BCP? When does it used?
BulkCopy is a tool used to copy huge amount of data from tables and views. BCP does not copy the structures same as source to destination.
28. Explain the use of the by GROUP BY and the HAVING clause?
The GROUP BY partitions the selected rows on the distinct values of the column on which the group by has been done.
The HAVING selects groups which match the criteria specified.
29. What is DataWarehousing?
According to Bill Inmon, known as father of Data warehousing. “A Data warehouse is a subject oriented, integrated ,time variant, non volatile collection of data in support of management’s decision making process”.
30. What are the advantages of Database?
Redundancy can be reduced
Inconsistence can be avoided
The data can be shared
Standards can be enforced
Security can be enforced
Integrity can be maintained
No comments:
Post a Comment