Data Architecture Flashcards
Extension for primary data file is
.mdf
Extension of secondary data file
.ndf
Extension for log file
.ldf
Every database has 2 files
Primary file and log file
A data base will have 2 forms of databases
System database ( with 4 Master, Model, Msdb, Temp file) and User database
Instance 2 will have a different storage than the default T/F
True
One instant is independent on each other even if it run on the same server
How do you name the second or third instant
The file name back slash and the instance name
CR1WINPSQL01\Instance2
Data base is made up for 2 file
Primary and log file
Which database is where all the data will be stored in permanently
Primary database
Data is durable or permanent or committed means
It is stored in primary data file
Data file is made up of _______ and the size of each _____ is ______
Pages
The size of each page is 8KB =8192 Bytes
Bytes stands for one character on a keyboard a,b….
Data file is made up of
Pages
Data base objects are
Tables, view, function, stored procedure, triggers
When we different set of table it will be on
Table 2 and so forth
When 8 consecutive tables are occupied with the same content it is called
Uniform Extents
When 8 consecutive tables are filled with different contents they are called
Mixed extent
What is the size of an extent
An extent is 8 pages so it will be 8 KB times 8 kb which will be 64 KB
A page- 8 KB -there is 8192 However there is a cost - area that is used for other things. Those things are
Page header-96 Byte
Row offset- where the raw starts -36 Bytes
The actual body of the page - 8060 Bytes
Is it mandatory to have a log file ?
Yes
Log file is where
Every action made on the data is stored
Every file regardless of data file or log file it should have 5 things
Logical name
Physical name
Initial growth
File growth
Max size
The name that is used to refer to the file
Logical name
Check point
The point where SQL server check if there is a successful transaction and transfer it to the Data file.
Should we always delete data from log file after every check point
It depends - on how critical the data is