Denomination Program In C – Finding The 500, 100, 50, 20, 10, 5, 2, 1

Currency Denomination Program In C. Finding the number of 500, 100, 50, 20, 10, 5, 2, 1 rupees in entered amount. If you are looking for a C program to find denomination example, this C programming example will help you to learn how to write a program for currency denomination in C. Just go through this C programming tutorial to learn about finding the number of 500, 100, 50, 20, 10, 5, 2, 1 rupees.

Denomination Program in C

C Currency Denomination Program – Table of Contents

  • C Program to Display The Denominations of an Amount
  • C Program For Denomination of an Amount Using While Loop – Source Code
  • C Program to Read an Amount and Find Number of Notes – Output
  • C Programming Tutorials

C Program to Display The Denominations of an Amount

Learn how to write a  c Program to Display The Denominations of an Amount. Writing a currency denomination program in C can be done using various techniques but here in this program, we show how to write a c multiplication table program using while loop in a proper way. Happy coding.

C Program For Denomination of an Amount Using While Loop – Source Code

You can copy paste the below C Program For Denomination of an Amount Using While Loop, in c compiler to check how the source code work. Or write your own currency denomination C Program with the help of this below c programming tutorial.

Source Code:

/* C PROGRAM TO DISPLAY DENOMINATIONS OF AN AMOUNT - DENOMINATION.C */

#include<stdio.h>
#include<conio.h>
void main()
{
    int rs, a, b, c, d, e, f, g, h ; //variable declaration
    clrscr() ;
    printf("Enter the amount in Rupees : ") ;
    scanf("%d", &rs) ; //reding input from uer

//C Program Logic For Denomination of an Amount Using While Loop
    while(rs >= 500)
    {
        a = rs / 500 ;
        printf("\nThe no. of five hundreds are : %d", a) ;
        break ;
    }
    while(rs >= 100)
    {
        b = rs / 100 ;
        printf("\n\nThe no. of hundreds are : %d", b) ;
        break ;
    }
    while(rs >= 50)
    {
        c = rs / 50 ;
        printf("\n\nThe no. of fifties are : %d", c) ;
        break ;
    }
    while(rs >= 20)
    {
        d = rs / 20 ;
        printf("\n\nThe no. of twenties are : %d", d) ;
        break ;
    }
    while(rs >= 10)
    {
        e = rs / 10 ;
        printf("\n\nThe no. of tens are : %d", e) ;
        break ;
    }
    while(rs >= 5)
    {
        f = rs / 5 ;
        printf("\n\nThe no. of fives are : %d", f) ;
        break ;
    }
    while(rs >= 2)
    {
        g = rs / 2 ;
        printf("\n\nThe no. of Twos are : %d", g) ;
        break ;
    }
    while(rs >= 1)
    {
        h = rs / 1 ;
        printf("\n\nThe no. of ones are : %d", h) ;
        break ;
    }
    getch() ;
}

C Program to Read an Amount and Find Number of Notes – OUTPUT

After you compile and run the above c program for currency denomination, your C compiler asks you to enter the amount to find the number of 500, 100, 50, 20, 10, 5, 2, 1 rupee notes. After you enter elements, the program will be executed and give output.

Output:

Enter the amount in Rupees : 179
The no. of hundreds are : 1
The no. of fifties are : 3
The no. of twenties are : 8
The no. of tens are : 17
The no. of fives are : 35
The no. of Twos are : 89
The no. of ones are : 179

C PROGRAMMING TUTORIALS

  1. C Program to Print Multiplication Table 
  2. C Program Array with Example
  3. Binary Search in C Program Using Recursion
  4. Bubble Sort in C Using Pointers
  5. Bubble Sort Program in C Using Recursion
  6. Bubble Sort Program in C Using Array
  7. Bubble Sort Program in C Using Function
  8. Bubble Sort Program in C Using Linked List
  9. Stack Push Pop Program in C Using Arrays
  10. Factorial Program in C Using Pointers
  11. Factorial Program in C Using While Loop
  12. C Program For Factorial Using For Loop
  13. Factorial Program in C Using Recursion Function
  14. C Program To Reverse a String Using Pointers
  15. C Program To Swap Two Numbers Using Two Variables
  16. C Program To Swap Two Numbers Using Three Variables
  17. C Program For Prime Numbers – Check  a Number is Prime or Not
  18. C Program To Reverse a String with Using Function
  19. C Program to Reverse a String without Using Function
  20. C Program to Reverse a Sting Using Recursion
  21. C Program For Palindrome String
  22. C Program For Palindrome Numbers
  23. C Program To Reverse a String with Using Function
  24. C Program To Reverse a String without Using Function
  25. C Program To Reverse a String Using Recursion

SSIS Interview Questions And Answers For Experienced

SSIS Interview Questions And Answers. If you are looking for SQL Server Integration Services Interview Questions, here is the comprehensive list from basic to most advanced SSIS interview questions for 2+, 3+, 4+, 5+, 6+ years of SSIS experienced professionals.

When attending interviews for experienced roles, you should know practical SSIS interview questions, and real-time SSIS scenario based interview questions. These SSIS interview questions for experienced will help you to crack your SSIS job interview.

SSIS Interview Questions

These are the basic interview questions on SSISSQL Server Integration Services. Go through this below list of beginner SSIS interview questions.

  1. Explain what is SSIS?
  2. Mention what are the important components of SSIS package?
  3. Explain what is Solution Explorer in SSIS?
  4. Explain what does it mean by data flow in SSIS?
  5. Define what is “task” in SSIS?

SSIS Package Interview Questions

  1. Explain what is SSIS package?
  2. List out different types of connection or files that support SSIS?
  3. Explain what is a container? How many types of containers are there in SSIS?
  4. Explain what is Precedence Constraint in SSIS?
  5. Explain what variables in SSIS and what are the types of variables in SSIS?

SSIS Checkpoint Interview Questions

  1. Explain what is a checkpoint in SSIS?
  2. Explain what is connection managers in SSIS?
  3. Explain what is SSIS breakpoint?
  4. Explain what is event logging in SSIS?
  5. Explain what is logging mode property?
  6. Explain what is a data flow buffer?

SSIS Split Interview Questions

  1. For what data checkpoint data is not saved?
  2. Explain what is conditional split transactions in SSIS?
  3. List out the different types of Data viewers in SSIS?
  4. Mention what are the possible locations to save SSIS package?
  5. What will be your first approach if the package that runs fine in Business Intelligence Development Studio (BIDS) but fails when running from an SQL agent job?

SSIS Event Handler Interview Questions

  1. Explain what is the role of Event Handlers tab in SSIS?
  2. Explain how you can notify the staff members about package failure?
  3. Explain how would you do logging in SSIS?
  4. Mention how would you deploy a SSIS package on production?
  5. Explain how to handle Early Arriving Facts or Late Arriving Dimension?
  6. Explain how can you do an incremental load?

SSIS Interview Questions For Experienced

  1. How do I sort packages in Solution Explorer?
  2. How do I check to see if a record exists in my destination and update it, and if it doesn’t exist, insert it?
  3. Why are my mapped drives not working?
  4. Why is my SQL Server Destination component not working?
  5. Why is my Excel interop failing intermittently in my Script Task?
  6. How do I set a flat file name for flat file connection manager dynamically?
  7. How do I use dynamic T-SQL in Lookup?
  8. How do I use lookup transformation to load data incrementally?
  9. How do I perform data type conversions in SSIS?
  10. How do I create a folder for SSIS package in MSDB with T-SQL?

SSIS Practical Interview Questions

  1. How do I resolve the error “Connection is busy with results for another command”?
  2. How do I programmatically create a Transfer SQL Server Objects task?
  3. How do I execute a stored procedure with a return value and an output parameter in an Execute SQL Task?
  4. How do I use the Fuzzy Grouping transformation?
  5. How do I use Integration Services to achieve Push-mode processing for Analysis Services?
  6. How do read data from Excel 2007 with Integration Services 2005?
  7. How do I upgrade my DTS packages to SSIS 2008 packages?
  8. How do I troubleshoot SSIS packages failed execution in a SQL Agent job?
  9. How do I track the error message when my SSIS package failed execution?
  10. How do I troubleshoot a connection error regarding DTS_E_CANNOTACQUIRECONNECTIONFROMCONNECTIONMANAGER ?

SSIS Scenario Based Interview Questions

  1. How do I troubleshoot SSIS package hanged for running?
  2. How do I use SSIS to completely transfer my database including logins, users, and permissions from one server to another server?
  3. How do I record log information in Script Component?
  4. How do I create and deploy a SSIS custom task?
  5. How do I improve package loading performance in BIDS when I open a package which is imported from another place?

 

Happy Learning..!!!

References:

https://social.msdn.microsoft.com/

RELATED INTERVIEW QUESTIONS

  1. Accenture Java Interview Questions
  2. Advanced Java Interview Questions
  3. Core Java Interview Questions
  4. .NET Interview Questions
  5. Ansible Interview Questions
  6. ServiceNow Interview Questions
  7. RPA Interview Questions
  8. Blue Prism Interview Questions
  9. SSIS Interview Questions And Answers
  10. Oracle Performance Tuning Interview Questions
  11. SCCM Interview Questions
  12. ServiceNow Interview Questions
  13. SQL Interview Questions
  14. Docker Interview Questions

C Program To Print Multiplication Table Using While Loop

C Program To Print Multiplication Table Using While Loop. If you are looking for a C program to generate multiplication table example, this C programming example will help you to learn how to write a program for multiplication table in C. Just go through this C programming tutorial to learn about multiplication table in C. It helps you to write a C program to display multiplication table.

C Program To Print Multiplication Table

C Multiplication Program – Table of Contents

  • C Program to Generate Multiplication Table
  • C Program to Print Multiplication Table – Source Code
  • C Program to Print Multiplication Table – Output
  • C Programming Tutorials

C Program to Generate Multiplication Table

Learn how to write a  c program to print multiplication table. Writing a multiplication table program in C can be done using various techniques but here in this program, we show how to write a c multiplication table program in a proper way. Happy coding.

C Program to Print Multiplication Table – Source Code

You can copy paste the below c program to display  multiplication table using while loop, in c compiler to check how the source code work. Or write your own multiplication C Program with the help of this below c program for multiplication table.

Source Code:

/* C PROGRAM TO PRINT MULTIPLICATION TABLE - MULTITABLE.C */

#include<stdio.h>
#include<conio.h>
void main()
{
    int r, c, y ; //variable declaration
    clrscr() ; 
    r = 1 ;
    
    printf("The multiplication table is :\n\n") ;
    do
    {
        c = 1 ;
        do
        {
            y = r * c ;
            printf("%5d", y) ;
            c = c + 1 ;
        } while(c <= 10) ;
        printf("\n\n") ;
        r = r + 1 ;
    } while(r <= 10) ;
    getch() ;
}

C program to print multiplication table – OUTPUT

After you compile and run the above c multiplication table program, your C compiler asks you to enter elements to print multiplication table. After you enter elements, the program will be executed and give output.

Output:

The multiplication table is :

1 2 3 4 5 6 7 8 9 10

2 4 6 8 10 12 14 16 18 20

3 6 9 12 15 18 21 24 27 30

4 8 12 16 20 24 28 32 36 40

5 10 15 20 25 30 35 40 45 50

6 12 18 24 30 36 42 48 54 60

7 14 21 28 35 42 49 56 63 70

8 16 24 32 40 48 56 64 72 80

9 18 27 36 45 54 63 72 81 90

10 20 30 40 50 60 70 80 90 100

C PROGRAMMING TUTORIALS

  1. C Program Array with Example
  2. Binary Search in C Program Using Recursion
  3. Bubble Sort in C Using Pointers
  4. Bubble Sort Program in C Using Recursion
  5. Bubble Sort Program in C Using Array
  6. Bubble Sort Program in C Using Function
  7. Bubble Sort Program in C Using Linked List
  8. Stack Push Pop Program in C Using Arrays
  9. Factorial Program in C Using Pointers
  10. Factorial Program in C Using While Loop
  11. C Program For Factorial Using For Loop
  12. Factorial Program in C Using Recursion Function
  13. C Program To Reverse a String Using Pointers
  14. C Program To Swap Two Numbers Using Two Variables
  15. C Program To Swap Two Numbers Using Three Variables
  16. C Program For Prime Numbers – Check  a Number is Prime or Not
  17. C Program To Reverse a String with Using Function
  18. C Program to Reverse a String without Using Function
  19. C Program to Reverse a Sting Using Recursion
  20. C Program For Palindrome String
  21. C Program For Palindrome Numbers
  22. C Program To Reverse a String with Using Function
  23. C Program To Reverse a String without Using Function
  24. C Program To Reverse a String Using Recursion

ServiceNow Interview Questions And Answers

ServiceNow Interview Questions And Answers. If you are looking for ServiceNow Interview Questions, here is the comprehensive list from basic to most advanced servicenow admin interview questions for 2+, 3+, 4+, 5+ years of experienced professionals. These servicenow developer interview questions will help you to crack your servicenow job interview.

ServiceNow Interview Questions

What is ServiceNow?

What is Integration?

What is Service Portal?

What is the latest servicenow user interface and when it was released?

What is full form of CMDB ?

What is CMDB Baseline ?

How to enable or disable an application ?

What is a view ?

What is ACL?

What do you mean by impersonating a user? How it is useful?

Which is the Parent table for incident,change and problem ?

What is a record producer ?

What is dictionary override?

What do you mean by coalesce?

What is an UI policy?

What is a data policy?

ServiceNow Interview Questions And Answers

Q) What provides a guide for moving data from import sets?
A) Transfrom map
Q) How do you change the sort sequence of fields or task?
A) Modify the order field
Q) Tables and Fields can be viewed and manipulated where?
A) Record List

Form
Tables and Columns

Q) What is the sequencing of publishing a Knowledge Article?
A) Draft

Review
Publish

Q) What are the 3 basic components of Workflow?
A) Approvals

Notifications
Task

Q) How do you modify or create workflow?
A) Utilize the Graphical Workflow Editor
Q) Where do you go in ServiceNow to change the banner and colors?
A) System Properties, then CSS Properties
Q) To access the control list you have to have which access?
A) Security_Admin
Q) What are the 3 basic components of workflow?
A) Approvals

Notifications
Task

Q) Where do you go to delete tables?
A) Tables and Columns

Choose “delete” and type the word “delete”

Q) What is a row?
A) A record is a row
Q) What is a column?
A) A field is a column
Q) What do incident, problem and change have in common?
A) They save to the task table

ServiceNow Admin Interview Questions

 Q) If importing data, how do you keep from importing duplicates?
A) Utilize the Coalace field to state which field is the unique key
Q) What controls what data users can access ?
A) ACL-Access Control List

ACLS is a rule that will match the object (Field or Table) and which permissions are required to access the object

Q) Where do you go to add/modify a service catalog item?
A) Service Catalog>Maintain Item
Q) What provides a guide for moving data from Import Sets?
A) Transform Map
Q) What is stored in a table?
A) Ddata
Q) How are users related to roles or groups?
A) 1 to many relationships
Q) What are update sets?
A) Groups of customizations that can be moved from one instance to another

(Homepages are not added by default, data does not get added to update sets, scheduled jobs are not added to update sets)

Q) What is a CI?
A) A CI is tangible and intangible
Q) What is BSM?
A) Business Service Management BSM map graphically displays the configuration items, CI, that support a business service.
Q) What is a tool that will autopopulate the CMDB about your windows computer?
A) Help the Helpdesk
Q) What is a record producer?
A) A specific type of catalog item that allows end users to create task based records such as incident from the service catalog
Q) Does ESS have a role?
A) ESS does not have a role
Q) When you open a service catalog and click the Order button what gets created?
A) REQ>RITM>TASK
Q) What is a select box, single line text, reference, check box, multiple choice?
A) variable

ServiceNow Developer Interview Questions

Q) What is a variable set?
A) Unit of variables that can be shared between catalog items
Q) What are the workflow stages?
A) Waiting for approval>fulfillment>delivery>completed
Q) What are the workflow activities?
A) approvals,conditions, notifications, task, timers, utilities
Q) If a request is rejected what happens?
A) Notification is sent and sets the status to canceled
service catalog workflow can be attached in 3 ways:
manually on the catalog item form
automatically based on conditions
automatically if no other workflows attached
Q) SLAs include actions that can be triggered when during the lifecycle?
A) Anytime
Q) What is the difference between SLA, OLA, and Underpinning Contracts?
A) Type Field
Q) Which workflow is designed to be used over and over again?
A) Default SLA Workflow
Q) Retroactive start when activated does what?
A) Sets start to equal when the ticket was created
Q) What are the steps in a SLA?
A) start

stop
pause

Q) What is ran on the client side and what is ran on the server side?
A) UI Policy/Client Script is Client Side and Business Rule/Data Policy is Server Side
Q) How can you set a read-only field?
A) UI Policy
Q) What controls enable admins to set mandatory and read only states for fields and can be used to enforce data consistence across applications?
A) Data policy
Q) What is a business rule?
A) A piece of JavaScript configured to run when a record is displayed, inserted, updated, deleted or when a table is queried. It can be set to run before or after the database action has occurred.
Q) What are update sets?
A) Customizations that can be moved from 1 instance to another
Q) How do you limit file attachments?
A) Security>System Security
Q) What is a security rule at the row and column level that is executed when attempting to access a ServiceNow table?
A) ACL-Access Control List
Q) What has conditions,scripts and roles and can limit security?
A) ACL-Access Control List
Q) What is the Duration of the elevated role?
A) Current Session

ServiceNow Interview Questions For Experienced

Q) When is a notification sent out?
A) When an event has been fired
Q) What is the notification flow and how can a notification be sent out?
A) Script, Business Rule, Workflow can all send out notifications
Q) Can a user open an Incident by email, if so what is utilized?
A) Inbound Email Action
Q) Where can you view information about system activity?
A) System logs
Q) If the system is going to be upgraded,what will be exempt from the upgrade?
A) Any record that has been altered from the base state by the customer
Q) What module tracks all upgrades made to the system?
A) System Diagnostics>Upgrade History
Q) What does SaaS stand for?
A) Software as a service
Q) Where does the home icon take you and what does the icon look like?
A) Takes you to the Homepage and the icon looks like a little home
Q) What can you do if the Homepage is slow?
 A) Remove some gauges or change the refresh rate
Q) My manager is going to be out of town and needs to have the supervisor approve while he/she is out of town, what would he/she utilize in ServiceNow?
A) Delegate-Delegation is the ability to designate other users to receive and interact with approvals and task assigned to you
Reference: https://quizlet.com/subject/servicenow/

C Program Array With Source Code Example

C Program Array With Source Code Example. If you are looking for a C program array example, this C programming tutorial will help you to learn how to write a program for array in C. Just go through this C programming example to learn about arrays in C. we are sure that you will be able to write a C programming for array.

C Program Array

C Program Array – Table of Contents

  • What is Array in C Programming?
  • Arrays Declaration And Initialization
  • C Program Array
  • C Program Array – Source Code
  • C Program Array – Output
  • C Programming Tutorials

What is Array in C Programming?

What is an array in C. An array is a kind of data structure, array is a collection of data that stores fixed number of values of same type. For example: if you want to store some numbers, you can create an array for it and store.

Array Syntax:

int number[10];

Once you declare the array size and array type, you cannot be changed.

Types of Arrays:

There are two types of arrays in C programming.

  1. Onedimensional arrays
  2. Multidimensional arrays

Arrays Declarations And Initialization

Arrays Declaration:

datatype arrayname[array size];

Array Example:

int numbers[5];

Here numbers array can hold 5 integer elements, in each field of numbers[0], numbers[1], numbers[2], numbers[3], numbers[4].

Initializing Arrays Elements:

Here are the different ways of initializing array elements:

  1. int numbers[5] = {5,10,15,20,25};
  2. int numbres[] = {5,10,15,20,25};

How elements stored in array

mark[0] is equal to 5
mark[1] is equal to 10
mark[2] is equal to 15
mark[3] is equal to 20
mark[4] is equal to 25

C Array Program Example

Learn how to write a  program for array in c. Writing an array program in C can be done using various techniques but here in this program, we show how to write a arrays program in c in a proper way. Happy coding.

C Program Array Source Code

You can copy paste the below array program in c compiler to check how the source code work. Or write your own array C Program with the help of this below c program for array.

/* C PROGRAM ARRAY - ARRAYEXAMPLE.C */
// C Program Array to find the average of the numbers 

#include <stdio.h>
int main()
{
 
//Array declaration
 int marks[10], i, n, sum = 0, average;
 printf("Enter n: "); //Asking user to enter number array size
 scanf("%d", &n); //Reading array elements
 for(i=0; i<n; ++i)
 {
 printf("Enter number%d: ",i+1); //Asking user to enter array elements 
 scanf("%d", &marks[i]); //Reading array elements
 sum += marks[i];
 }
 average = sum/n;

printf("Average = %d", average); //Printing output

return 0;
}

C PROGRAM Array – OUTPUT

After you compile and run the above c program array, your C compiler asks you to enter elements for the array to perform the average. After you enter elements, the program will be executed and give output.

Output:

Enter n: 5

Enter number1: 10

Enter number2: 15

Enter number3: 20

Enter number4: 25

Enter number5: 30

Average = 20

C PROGRAMMING TUTORIALS

  1. Binary Search in C Program Using Recursion
  2. Bubble Sort in C Using Pointers
  3. Bubble Sort Program in C Using Recursion
  4. Bubble Sort Program in C Using Array
  5. Bubble Sort Program in C Using Function
  6. Bubble Sort Program in C Using Linked List
  7. Stack Push Pop Program in C Using Arrays
  8. Factorial Program in C Using Pointers
  9. Factorial Program in C Using While Loop
  10. C Program For Factorial Using For Loop
  11. Factorial Program in C Using Recursion Function
  12. C Program To Reverse a String Using Pointers
  13. C Program To Swap Two Numbers Using Two Variables
  14. C Program To Swap Two Numbers Using Three Variables
  15. C Program For Prime Numbers – Check  a Number is Prime or Not
  16. C Program To Reverse a String with Using Function
  17. C Program to Reverse a String without Using Function
  18. C Program to Reverse a Sting Using Recursion
  19. C Program For Palindrome String
  20. C Program For Palindrome Numbers
  21. C Program To Reverse a String with Using Function
  22. C Program To Reverse a String without Using Function
  23. C Program To Reverse a String Using Recursion

Docker Interview Questions And Answers

Docker Interview Questions And Answers. If you are looking for Docker Interview Questions, here is the comprehensive list from basic to most advanced docker container interview questions for 2+, 3+, 4+, 5+ years of experienced professionals. These docker devops interview questions will help you to crack your devops job interview.

Docker Interview Questions

  1. What is Docker?
  2. What is the difference between Docker image and Docker container?
  3. How will you remove an image from Docker?
  4. How is a Docker container different from a hypervisor?
  5. Can we write compose file in json file instead of yaml?
  6. Can we run multiple apps on one server with Docker?
  7. What are the common use cases of Docker?
  8. What are the main features of Docker-compose?
  9. What is the most popular use of Docker?
  10. What is the role of open source development in the popularity of Docker?
  11. What is the difference between Docker commands: up, run and start?
  12. What is Docker Swarm?
  13. What are the features of Docker Swarm?
  14. What is a Docker Image?
  15. What is a Docker Container?
  16. What is Docker Machine?
  17. Why do we use Docker Machine?
  18. How will you create a Container in Docker?
  19. Do you think Docker is Application-centric or Machine-centric?
  20. Can we lose our data when a Docker Container exits?
  21. Can we run more than one process in a Docker container?
  22. What are the objects created by Docker Cloud  in Amazon Web Services (AWS) EC2?

Top Docker Interview Questions

  1. How will you take backup of Docker container volumes in AWS S3?
  2. What are the three main steps of Docker Compose?
  3. What is Pluggable Storage Driver architecture in Docker based containers?
  4. What is Docker Hub?
  5. What are the main features of Docker Hub?
  6. What are the main security concerns with Docker based containers?
  7. What are the security benefits of using Container based system?
  8. How can we check the status of a Container in Docker?
  9. What are the main benefits of using Docker?
  10. How does Docker simplify Software Development process?
  11. What is the basic architecture behind Docker?
  12. What are the popular tasks that you can do with Docker Command line tool?
  13. What type of applications- Stateless or Stateful are more suitable for Docker Container?
  14. How can Docker run on different Linux distributions?
  15. Why do we use Docker on top of a virtual machine?
  16. How can Docker container share resources?
  17. What is the difference between Add and Copy command in a Dockerfile?
  18. What is Docker Entrypoint?
  19. What is ONBUILD command in Docker?
  20. What is Build cache in Docker?
  21. What are the most common instructions in Dockerfile?
  22. What is the purpose of EXPOSE command in Dockerfile?
  23. What are the different kinds of namespaces available in a Container?
  24. How will you monitor Docker in production?
  25. What are the Cloud platforms that support Docker?
  26. How can we control the startup order of services in Docker compose?
  27. Why Docker compose does not wait for a container to be ready before moving on to start next service in dependency order?
  28. How will you customize Docker compose file for different environments?

Docker Interview Questions And Answers

  1. So what exactly is Docker? Something about “container applications” right?

Docker is an open platform that both IT operations teams and Developer team use to build, ship and run their applications, giving them the agility, portability and control that each team requires across the software supply chain.

We have created a standard Docker container that packages up an application, with everything that the applications requires to run. This standardization allows teams to containerize applications and run them in any environment, on any infrastructure and to be written in any language

  1. What is a Docker container and how is it different than a VM?  Does containerization replace my virtualization infrastructure?

Containerization is very different from virtualization. It starts with the Docker engine, the tool that creates and runs containers (1 or more), and is the Docker installed software on any physical, virtual or cloud host with a compatible OS. Containerization leverages the kernel within the host operating system to run multiple root file systems.

We call these root file systems “containers.” Each container shares the kernel within the host OS, allowing you to run multiple Docker containers on the same host. Unlike VMs, containers do not have an OS within it. They simply share the underlying kernel with the other containers.

Each container running on a host is completely isolated so applications running on the same host are unaware of each other (you can use Docker Networking to create a multi-host overlay network that enables containers running on hosts to speak to one another).

The image below shows containerization on the left and virtualization on the right. Notice how containerization (left), unlike virtualization (right) does not require a hypervisor or multiple OSs.

Docker containers and traditional VMs are not mutually exclusive, so no, containers do not have to replace VMs. Docker containers can actually run within VMs. This allows teams to containerize each service and run multiple Docker containers per vm.

Advanced Docker Interview Questions

 

  1. What’s the benefit of “Dockerizing?”…

By Dockerizing their environment enterprise teams can leverage the Docker Containers as a Service Platform (CaaS). CaaS gives development teams and IT operations teams agility, portability and control within their environment.

Developers love Docker because it gives them the ability to quickly build and ship applications. Since Docker containers are portable and can run in any environment (with Docker Engine installed on physical, virtual or cloud hosts), developers can go from dev, test, staging and production seamlessly, without having to recode.

This accelerates the application lifecycle and allows them to release applications 13x more often. Docker containers also makes it super easy for developers to debug applications, create an updated image and quickly ship an updated version of the application.

IT Ops teams can manage and secure their environment while allowing developers to build and ship apps in a self-service manner. The Docker CaaS platform is supported by Docker, deploys on-premises and is chock full of enterprise security features like role-based access control, integration with LDAP/AD, image signing and many more.

In addition, IT ops teams have the ability to manage deploy and scale their Dockerized applications across any environment. For example, the portability of Docker containers allows teams to migrate workloads running in AWS over to Azure, without having to recode and with no downtime.

Team cans also migrate workloads from their cloud environment, down to their physical datacenter, and back. This enables teams to utilize the best infrastructure for their business needs, rather than being locked into a particular infrastructure type.

The lightweight nature of Docker containers compared to traditional tools like virtualization, combined with the ability for Docker containers to run within VMs, allowing teams to optimize their infrastructure by 20X, and save money in the process.

  1. From an infrastructure standpoint, what do I need from Docker? Is Docker a piece of hardware running in my datacenter, and how taxing is it on my environment?

The Docker engine is the software that is installed on the host (bare metal server, VM or public cloud instance) and is the only “Docker infrastructure” you’ll need. The tool creates, runs and manages Docker containers. So actually, there is no hardware installation necessary at all.

The Docker Engine itself is very lightweight, weighing in around 80 MB total.

Docker Container Interview Questions

  1. What exactly do you mean by “Dockerized node”? Can this node be on-premises or in the cloud?

A Dockerized node is anything i.e a bare metal server, VM or public cloud instance that has the Docker Engine installed and running on it.

Docker can manage nodes that exist on-premises as well as in the cloud. Docker Datacenter is an on-premises solution that enterprises use to create, manage, deploy and scale their applications and comes with support from the Docker team.

It can manage hosts that exist in your datacenter as well as in your virtual private cloud or public cloud provider (AWS, Azure, Digital Ocean, SoftLayer etc.).

  1. Do Docker containers package up the entire OS and make it easier to deploy?

Docker containers do not package up the OS. They package up the applications with everything that the application needs to run. The engine is installed on top of the OS running on a host. Containers share the OS kernel allowing a single host to run multiple containers.

  1. What OS can the Docker Engine run on?

The Docker Engine runs on all modern Linux distributions. We also provide a commercially supported Docker Engine for Ubuntu, CentOS, OpenSUSE, RHEL. There is also a technical preview of Docker running on Windows Server 2016.

IT Admin Docker Interview Questions

  1. How does Docker help manage my infrastructure? Do I containerize all my infrastructure or something?

Docker isn’t focused on managing your infrastructure. The platform, which is infrastructure agnostic, manages your applications and helps ensure that they can run smoothly, regardless of infrastructure type via solutions like Docker Datacenter. This gives your company the agility, portability and control you require. Your team is responsible for managing the actual infrastructure.

  1. How many containers can run per host?

As far as the number of containers that can be run, this really depends on your environment. The size of your applications as well as the amount of available resources (i.e like CPU) will all affect the number of containers that can be run in your environment. Containers unfortunately are not magical. They can’t create new CPU from scratch. They do, however, provide a more efficient way of utilizing your resources. The containers themselves are super lightweight (remember, shared OS vs individual OS per container) and only last as long as the process they are running. Immutable infrastructure if you will.

  1. What do I have to do to begin the “Dockerization process”

The best way for your team to get started is for your developers to download Docker for Mac or Docker Windows. These are native installations of Docker on a Mac or Windows device.

From their, developers will take their applications and create a Dockerfile. The Dockerfile is where all of the application configuration is specified. It is essentially the blueprint for the Docker Image.

The image is a snapshot of your application and is what the Docker Engine looks at so it knows what the container it is spinning up should look like.

References for Docker Interview Questions:

www.docker.com

www.udemy.com

RELATED INTERVIEW QUESTIONS

  1. Accenture Java Interview Questions
  2. Advanced Java Interview Questions
  3. Core Java Interview Questions
  4. .NET Interview Questions
  5. Ansible Interview Questions
  6. ServiceNow Interview Questions
  7. RPA Interview Questions
  8. Blue Prism Interview Questions
  9. SSIS Interview Questions And Answers
  10. Oracle Performance Tuning Interview Questions
  11. SCCM Interview Questions
  12. ServiceNow Interview Questions
  13. SQL Interview Questions
  14. Docker Interview Questions

Oracle Performance Tuning Interview Questions And Answers

Oracle Performance Tuning Interview Questions And Answers. If you are looking for Performance Tuning Interview Questions, here is the comprehensive list from basic to most advanced oracle database performance tuning interview questions for 2+, 3+, 4+, 5+ years of experienced professionals. These oracle performance tuning interview questions will help you to crack your oracle job interview.

Oracle Performance Tuning Interview Questions

What Is Performance Tuning?

Making optimal use of system using existing resources called performance tuning.

What Are The Types Of Tunings?

CPU TuningMemory TuningIO TuningApplication TuningDatabase Tuning

What Mainly Database Tuning Contains?

Hit RatiosWait Events

What Is An Optimizer?

Optimizer is a mechanism which will make the execution plan of an sql statement.

What Are The Types Of Optimizers?

RBO(Rule Based Optimizer)CBO(Cost Based Optimizer)

Which Optimizer Is The Best One?

CBO

What Are The Pre Requsited To Make Use Of Optimizer?

Set the optimizer modeCollect the statistics of an object

How Do You Collect Statistics Of A Table?

Analyze table emp compute statistics or analyze table emp estimate statistics.

What Is The Diff Between Compute And Estimate?

If you use compute, The FTS will happen, if you use estimate just 10% of the table will be read

Data Dictionary Follows Which Optimizer Mode?

RBO.

How Do You Delete Statistics Of An Object?

Analyze table emp delete statistics.

How Do You Collect Statistics Of A User/schema?

exec dbms_stats.gather_schema_stats(scott)

How Do You See The Statistics Of A Table?

select num_rows,blocks,empty_blocks from dba_tables where tab_name=’emp’

What Are Chained Rows?

These are rows, it spans in multiple blocks.

Oracle Performance Tuning Interview Questions And Answers

How Do You Collect Statistics Of A User In Oracle Apps?

fnd_stats package.

How Do You Know What Sql Is Currently Being Used By The Session?

By goind v$sql and v$sql_area.

What Is A Execution Plan?

Its a road map how sql is being executed by oracle db..

How Do You Get The Index Of A Table And On Which Column The Index Is?

dba_indexes and dba_ind_columns

Which Init Parameter You Have To Set To Bypass Parsing?

cursor_sharing=force

How Do You Know Which Session Is Running Long Jobs?

by going v$session_longops

How Do You Flush The Shared Pool?

alter system flush shared_pool

How Do You Get The Info About Fts?

using v$sysstat

How Do You Increase The Db Cache?

alter table emp cache

Where Do You Get The Info Of Library Cache?

v$librarycache

How Do You Get The Information Of Specific Session?

v$mystat

How Do You See The Trace Files?

using tkprof usage: tkprof allllle.trc llkld.txt

Performance Tuning Interview Questions

A tablespace has a table with 30 extents in it. Is this bad? Why or why not?

Expected answer: Multiple extents in and of themselves aren’t bad.

However, if you also have chained rows this can hurt performance.

How do you set up tablespaces during an Oracle installation?

Expected answer: You should always attempt to use the Oracle Flexible Architecture standard or another partitioning scheme to ensure proper separation of SYSTEM, ROLLBACK, REDO LOG, DATA, TEMPORARY and INDEX segments.

You see multiple fragments in the SYSTEM tablespace, what should you check first?

Expected answer: Ensure that users don’t have the SYSTEM tablespace as their TEMPORARY or DEFAULT tablespace assignment by checking the DBA_USERS view.

What are some indications that you need to increase the SHARED_POOL_SIZE parameter?

Expected answer: Poor data dictionary or library cache hit ratios, getting error ORA-04031. Another indication is steadily decreasing performance with all other tuning parameters the same.

What is the general guideline for sizing db_block_size and db_multi_block_read for an application that does many full table scans?

Expected answer: Oracle almost always reads in 64k chunks. The two should have a product equal to 64 or a multiple of 64.

What is the fastest query method for a table?

Expected answer: Fetch by

rowid

Explain the use of TKPROF? What initialization parameter should be turned on to get full TKPROF output?

Expected answer:

The tkprof tool is a tuning tool used to determine cpu and execution times for SQL statements. You use it by first setting timed_statistics to true in the initialization file and then turning on tracing for either the entire database via the sql_trace parameter or for the session using the ALTER SESSION command.

Once the trace file is generated you run the

tkprof

tool against the trace file and then look at the output from the

tkprof

tool. This can also be used to generate explain plan output.

When looking at v$sysstat you see that sorts (disk) is high. Is this bad or good? If bad, how do you correct it?

Expected answer: If you get excessive disk sorts this is bad. This indicates you need to tune the sort area parameters in the initialization files. The major sort are parameter is the SORT_AREA_SIZe parameter.

Advanced Oracle Performance Tuning Interview Questions

When should you increase copy latches? What parameters control copy latches?

Expected answer: When you get excessive contention for the copy latches as shown by the “redo copy” latch hit ratio. You can increase copy latches via the initialization parameter LOG_SIMULTANEOUS_COPIES to twice the number of CPUs on your system.

Where can you get a list of all initialization parameters for your instance? How about an indication if they are default settings or have been changed?

Expected answer: You can look in the init.ora file for an indication of manually set parameters. For all parameters, their value and whether or not the current value is the default value, look in the v$parameter view.

Describe hit ratio as it pertains to the database buffers. What is the difference between instantaneous and cumulative hit ratio; which should be used for tuning?

Expected answer: Hit ratio is a measure of how many times the database was able to read a value from the buffers verses how many times it had to re-read a data value from the disks.

A value greater than 80-90% is good, less could indicate problems. If you take the ratio of existing parameters this will be a cumulative value since the database started.

If you do a comparison between pairs of readings based on some arbitrary time span, this is the instantaneous ratio for that time span. Generally speaking an instantaneous reading gives more valuable data since it will tell you what your instance is doing for the time it was generated over.

Discuss row chaining, how does it happen? How can you reduce it? How do you correct it?

Expected answer: Row chaining occurs when a VARCHAR2 value is updated and the length of the new value is longer than the old value and won’t fit in the remaining block space.

This results in the row chaining to another block. It can be reduced by setting the storage parameters on the table to appropriate values. It can be corrected by export and import of the effected table.

Oracle Database Tuning Questions

When looking at the estat events report you see that you are getting busy buffer waits. Is this bad? How can you find what is causing it?

Expected answer: Buffer busy waits may indicate contention in redo, rollback or data blocks. You need to check the v$waitstat view to see what areas are causing the problem.

The value of the “count” column tells where the problem is, the “class” column tells you with what. UNDO is rollback segments, DATA is data base buffers.

If you see contention for library caches how can you fix it?

Expected answer: Increase the size of the shared pool.

If you see statistics that deal with “undo” what are they really talking about?

Expected answer: Rollback segments and associated structures.

If a tablespace has a default pctincrease of zero what will this cause (in relationship to the smon process)?

Expected answer: The SMON process won’t automatically coalesce its free space fragments.

If a tablespace shows excessive fragmentation what are some methods to defragment the tablespace? (7.1,7.2 and 7.3 only)

Expected answer: In Oracle 7.0 to 7.2 The use of the ‘alter session set events ‘immediate trace name coalesce level ts#’;’ command is the easiest way to defragment contiguous free space fragmentation.

The ts# parameter corresponds to the ts# value found in the ts$ SYS table. In version 7.3 the ‘alter tablespace coalesce;’ is best. If free space isn’t contiguous then export, drop and import of the tablespace contents may be the only way to reclaim non-contiguous free space.

How can you tell if a tablespace has excessive fragmentation?

If a select against the dba_free_space table shows that the count of a tablespaces extents is greater than the count of its data files, then it is fragmented.

You see the following on a status report:
redo log space requests 23
redo log space wait time 0
Is this something to worry about? What if redo log space wait time is high? How can you fix this?

Expected answer: Since wait time is zero, no. If wait time was high it might indicate a need for more or larger redo logs.

References:

Tech Target Interview Questions

Wisdom Jobs Interview Questions

RELATED INTERVIEW QUESTIONS

  1. Accenture Java Interview Questions
  2. Advanced Java Interview Questions
  3. Core Java Interview Questions
  4. .NET Interview Questions
  5. Ansible Interview Questions
  6. ServiceNow Interview Questions
  7. RPA Interview Questions
  8. Blue Prism Interview Questions
  9. SSIS Interview Questions And Answers
  10. Oracle Performance Tuning Interview Questions
  11. SCCM Interview Questions
  12. ServiceNow Interview Questions
  13. SQL Interview Questions
  14. Docker Interview Questions

Blue Prism Interview Questions And Answers

Blue Prism Interview Questions And Answers from Coding compiler. If you are looking for Blue Prism Interview Questions, here is the comprehensive list from basic to most advanced blue prism interview questions for 2+, 3+, 4+, 5+ years of experienced professionals. These robotic process automation interview questions will help you to crack your RPA job interview.

Continue reading “Blue Prism Interview Questions And Answers”

SCCM Interview Questions And Answers Latest

SCCM Interview Questions And Answers Latest. If you are looking for SCCM Interview Questions, here is the comprehensive list from basic to most advanced SCCM interview questions for 2+, 3+, 4+, 5+ years of experienced professionals. These system center configuration manager interview questions will help you to crack your SCCM job interview.

SCCM Interview Questions

  • The Configuration Manager Console and Collections
  • Sites and Hierarchies
  • Migration
  • Security and Role-Based Administration
  • Client Deployment and Operations
  • Mobile Devices
  • Remote Control
  • Software Deployment
  • Endpoint Protection

SCCM Interview Questions And Answers

 

The Configuration Manager Console and Collections Interview Questions

 The following frequently asked questions relate to the Configuration Manager console and collections.

A) Yes. The Configuration Manager console is a 32-bit program that can run on a 32-bit version of Windows and on a 64-bit version of Windows.

A) In System Center 2012 Configuration Manager, all collections must be limited to the membership of another collection. When you create a collection, you must specify a limiting collection. A collection is always a subset of its limiting collection.

A) Yes. System Center 2012 Configuration Manager includes two new collection rules, the Include Collections rule and the Exclude Collectionsrule that allow you to include or exclude the membership of specified collections.

A) No. Collections configured by using query rules that use certain classes do not support incremental updates.

A) The All Unknown Computers collection contains two objects that represent records in the Configuration Manager database so that you can deploy operating systems to computers that are not managed by Configuration Manager, and so are unknown to Configuration Manager.

These computers can include the following:

  • A computer where the Configuration Manager client is not installed
  • A computer that is not imported into Configuration Manager
  • A computer that is not discovered by Configuration Manager

Q) Why does Install Client from the ribbon install the client to the whole collection when I’ve selected a single computer but installs to the selected computer only if I right-click the computer and then select Install Client?

A) If you choose Install Client from the ribbon when the Collection ribbon tab is selected, the client installs to all computers in the collection rather than to just the selected computer.

To install the client to just the selected computer, click the Home tab on the ribbon before you click Install Client from the ribbon, or use the right-click option.

A) For System Center 2012 Configuration Manager SP1 and later:

Because an ID for each device type (for example Windows computers, Mac computers, or Linux computers) is stored in the Configuration Manager database, you can create a collection that contains a query rule to return only devices with a specified ID.

A) For System Center 2012 Configuration Manager SP1 and later:

Create a collection with a query-based rule. Query the attribute class System Resource and the attribute Connected Standby Capable = TRUEto return computers that are Always On Always Connected capable.

A) The Configuration Manager console uses HTTP to the Internet in two scenarios:

  • When you use the geographical view from the Site Hierarchy node in the Monitoring workspace, which uses Internet Explorer to access Bing Maps.
  • When you use the Configuration Manager help file and click a link to view or search for information on TechNet.

If you do not require these functions, your firewall can block HTTP connections from the console without additional loss of functionality to Configuration Manager.

Q) How can I increase the number of search results in the Configuration Manager console?

A) By default, the Configuration Manager console limits search results to 1,000 items. You can change this value by using the Search tab. In the Options group. click Search Settings and then change the Search Results value in the Search Settings dialog box.

A) By default, the Configuration Manager console limits searches to the current folder. You can change this behavior by first clicking in the Search box in the results pane.

Then, in the Search tab, in the Scope group. click All Subfolders. In the results pane, the search is extended to AND Path <Current Node + Subfolders>. Add criteria if required, and type your search text to search the current folder and its subfolders.

Sites and Hierarchies in SCCM Interview Question

 The following frequently asked questions relate to sites and hierarchies in Configuration Manager.

A) No. The Active Directory schema extensions for System Center 2012 Configuration Manager are unchanged from those used by Configuration Manager 2007.

If you extended the schema for Configuration Manager 2007, you do not need to extend the schema again for System Center 2012 Configuration Manager or System Center 2012 Configuration Manager SP1.

A) No. Unless you were in a prerelease program that was supported by Microsoft (such as the Technology Adoption Program or the Community Evaluation Program) there is no supported upgrade path for prerelease versions of System Center 2012 Configuration Manager.

A) No. SMS 2003 sites and SMS 2003 clients are not supported by System Center 2012 Configuration Manager. You have two choices to move these sites and clients to System Center 2012 Configuration Manager:

  • Upgrade SMS 2003 sites and clients to Configuration Manager 2007 SP2, and then migrate them to System Center 2012 Configuration Manager.
  • Uninstall SMS 2003 sites and clients and then install System Center 2012 Configuration Manager sites and clients.

A) Yes. If the evaluation version is not a prerelease version of System Center 2012 Configuration Manager, you can upgrade it to the full version.

Q) Have the site types changed from Configuration Manager 2007?

A) System Center 2012 Configuration Manager introduces changes to both primary and secondary sites while the central administration site is new site type.
The central administration site replaces the primary site referred to as a central site as the top-level site of a multi-primary site hierarchy.
This site does not directly manage clients but does coordinate a shared database across your hierarchy, and it is designed to provide centralized reporting and configurations for your entire hierarchy.

A) In System Center 2012 Configuration Manager with no service pack, you cannot change the parent relationship of an active site. You can only add a site as a child of another site at the time you install the new site.

Because the database is shared between all sites, joining a site that has already created default objects or that has custom configurations can result in conflicts with similar objects that already exist in the hierarchy.

However, in System Center 2012 Configuration Manager SP1, you can expand a stand-alone primary site into a hierarchy that includes a new central administration site.

A) With System Center 2012 Configuration Manager, primary sites have changed to support only secondary sites as child sites, and the new central administration site as a parent site.

Unlike Configuration Manager 2007, primary sites no longer provide a security or configuration boundary. Because of this, you should only need to install additional primary sites to increase the maximum number of clients your hierarchy can support, or to provide a local point of contact for administration.

A) In System Center 2012 Configuration Manager, secondary sites require either SQL Server, or SQL Server Express to support database replication with their parent primary site. When you install a secondary site, Setup automatically installs SQL Server Express if a local instance of SQL Server is not already installed.

A) Database replication uses SQL Server to quickly transfer data for settings and configurations to other sites in the Configuration Manager hierarchy. Changes that are made at one site merge with the information stored in the database at other sites.

Content for deployments, and other file-based data, still replicate by file-based replication between sites. Database replication configures automatically when you join a new site to an existing hierarchy.

A) Active Directory Forest discovery is a new discovery method in System Center 2012 Configuration Manager that allows you to discover network locations from multiple Active Directory forests.

This discovery method can also create boundaries in Configuration Manager for the discovered network locations and you can publish site data to another Active Directory forest to help support clients, sites, and site system servers in those locations.

A) Yes. System Center 2012 Configuration Manager applies a hierarchy-wide set of default client settings (formerly called client agent settings) that you can then modify on clients by using custom client settings that you assign to collections.

This creates a flexible method of delivering customized client settings to any client in your hierarchy, regardless of the site it is assigned to, or where it is located on your network.

A) Configuration Manager supports site-to-site (intersite) communication when a two-way forest trust exists between the forests. Within a site, Configuration Manager supports placement of site system roles on computers in an untrusted forest.

Configuration Manager also supports clients that are in a different forest from their site’s site server when the site system role that they connect to is in the same forest as the client.

A) No. Because System Center 2012 Configuration Manager supports installing most site system roles in untrusted forests, there is no requirement to have a separate site for this scenario, unless you have exceeded the maximum number of supported clients for a site.

A) System Center 2012 Configuration Manager clients can find available management points by using the management point that you specify during client deployment, Active Directory Domain Services, DNS, and WINS.

Clients can connect to more than one management point in a site, always preferring communication that uses HTTPS, when this is possible because the client and management point uses PKI certificates.

There are some changes here since Configuration Manager 2007, which accommodate the change that clients can now communicate with more than one management point in site, and that you can have a mix of HTTPS and HTTP site system roles in the same site.

A) System Center 2012 Configuration Manager has replaced the native mode site configuration in Configuration Manager 2007 with individual site system role configurations that accept client communication over HTTPS or HTTP.

Because you can have site system roles that support HTTPS and HTTP in the same site, you have more flexibility in how you introduce PKI to secure the intranet client endpoints within the hierarchy. Clients over the Internet and mobile devices must use HTTPS connections.

Q) Where are the supported scenarios and network diagrams for Internet-based client management that you had for Configuration Manager 2007?

A) Unlike Configuration Manager 2007, there are no design restrictions to support clients on the Internet, providing you meet the requirements in the Planning for Internet-Based Client Management section in the Planning for Communications in Configuration Manager topic.
Because of the following improvements, you can more easily support clients on the Internet to fit your existing infrastructure:
  • The whole site does not have to be using HTTPS client connections
  • Support for installing most site system roles in another forest
  • Support for multiple management points in a site

If you use multiple management points and dedicate one or more for client connections from the Internet, you might want to consider using database replicas for management points.

A) No. Although both configurations use the Internet, they are independent from each other. Clients on the intranet can use cloud-based distribution points and these clients do not require a PKI client certificate.

However, you still require PKI certificates if you want to use cloud-based distribution points; one for the Windows Azure management certificate that you install on the site system server that hosts the cloud-based distribution points, and one for the cloud-based distribution point service certificate that you import when you configure the cloud-based distribution point.

A) Configuration Manager supports some site system roles only at specific sites in a hierarchy, and some site system roles have other limitations as to where and when you can install them. When Configuration Manager does not support the installation of a site system role, it is not listed in the wizard.

For example, the Endpoint Protection point cannot be installed in a secondary site, or in a primary site if you have a central administration site. So if you have a central administration site, you will not see the Endpoint Protection point listed if you run the Add Site System Roles Wizard on a primary site.

Other examples include you cannot add a second management point to a secondary site, and you cannot add a management point or distribution point to a central administration site.

In addition, in Configuration Manager SP1, you do not see the Microsoft Intune connector listed as an available site system role until you have created the Microsoft Intune subscription.

Use the following procedure to configure the Network Access Account:

How to configure the Network Access Account for a site

  1. In the Administration workspace, expand Site Configuration, click Sites, and then select the site.

  2. On the Settings group, click Configure Site Components, and then click Software Distribution.

  3. Click the Network Access Account tab, configure the account, and then click OK.

A) Configuration Manager offers a number of high availability solutions.

SCCM Migration Interview Questions

The following frequently asked questions relate to migrating Configuration Manager 2007 to System Center 2012 Configuration Manager.

A) The version of System Center 2012 Configuration Manager that you use to run migration determines the versions of Configuration Manager 2007 or System Center 2012 Configuration Manager that are supported for migration:

  • When you use System Center 2012 Configuration Manager with no service pack, Configuration Manager 2007 sites with SP2 are supported for migration.
  • When you use System Center 2012 Configuration Manager with SP1, Configuration Manager 2007 sites with SP2 and System Center 2012 Configuration Manager sites with SP1 are supported for migration.

Configuration Manager hierarchies that have data you want to migrate are called source hierarchies. The Configuration Manager hierarchy you re migrating data into, is called the destination hierarchy.

Q) Can I use Configuration Manager SP1 to migrate my existing System Center 2012 Configuration Manager hierarchy with no service pack to a new Configuration Manager SP1 hierarchy?

A) No. The new functionality in Configuration Manager SP1 supports migration from an existing Configuration Manager SP1 hierarchy to another Configuration Manager SP1 hierarchy, in addition to supporting migration from Configuration Manager 2007 SP2 to Configuration Manager SP1.

A) Several important changes introduced with System Center 2012 Configuration Manager prevent an in-place upgrade; however, System Center 2012 Configuration Manager does support migration from Configuration Manager 2007 with a side-by-side deployment.

For example, System Center 2012 Configuration Manager is native 64 bit application with a database that is optimized for Unicode and that is shared between all sites. Additionally, site types and site relationships have changed. These changes, and others, mean that many existing hierarchy structures cannot be upgraded.

A) Typically, you will migrate data from a Configuration Manager 2007 or System Center 2012 Configuration Manager hierarchy (the source hierarchy) over a period of time that you define.

During the period of migration, you can continue to use your source hierarchy to manage clients that have not migrated to your new System Center 2012 Configuration Manager hierarchy (the destination hierarchy).

Additionally if you update an object in the source hierarchy after you have migrated that object to your destination hierarchy, you can re-migrate that object again up until you decide to complete your migration.

A) When you migrate a Configuration Manager 2007 package to System Center 2012 Configuration Manager, it remains a package after migration.

If you want to deploy the software and packages that migrate from your Configuration Manager 2007 hierarchy by using the new application model, you can use Microsoft System Center Configuration Manager Package Conversion Manager to convert them into System Center 2012 Configuration Manager applications.

A) This type of information is easily recreated by an active client when it sends data to its new site in the destination hierarchy. Typically, it is only the current information from each client that provides useful information.
To retain access to historical inventory information you can keep a Configuration Manager 2007 or System Center 2012 Configuration Manager source site active until the historical data is no longer required.

A) When you assign a site in the destination hierarchy to own the content, you are selecting the site that maintains that content in the destination hierarchy. Because the site that owns the content is responsible for monitoring the source files for changes, plan to specify a site that is near to the source file location on the network.

When you migrate content between a source and destination hierarchy, you are really migrating the metadata about that content. The content itself might remain hosted on a shared distribution point during migration, or on a distribution point that you will upgrade or reassign to the destination hierarchy.

A) Shared distribution points are distribution points at sites in the source hierarchy that can be used by clients in the destination herarchy during the migration period.

A distribution point can be shared only when the source hierarchy that contains the distribution point remains the active source hierarchy and distribution point sharing is enabled for the source site that contains the distribution point. Sharing distribution points ends when you complete migration from the source hierarchy.

A) System Center 2012 Configuration Manager can upgrade supported distribution points from Configuration Manager 2007 source hierarchies, and reassign supported distribution points from System Center 2012 Configuration Manager source hierarchies.

When you upgrade or reassign a shared distribution point, the distribution point site system role and the distribution point computer are removed from the source hierarchy, and installed as a distribution point at a site you select in the destination hierarchy. This process allows you to maintain your existing distribution points with minimal effort or disruption to your network.

You can also use the prestage option for System Center 2012 Configuration Manager distribution points to reduce the transfer of large files across low-bandwidth network connections.

A) You can perform an in-place upgrade of a Configuration Manager 2007 distribution point that preserves all content during the upgrade. This includes an upgrade of a distribution point on a server share, a branch distributing point, or standard distribution point.

A) You can perform an in-place upgrade of a Configuration Manager 2007 secondary site to a System Center 2012 Configuration Manager distribution point. During the upgrade, all migrated content is preserved.

A) During the upgrade to a System Center 2012 Configuration Manager distribution point, all migrated content is copied and then converted to the single instance store.

When you migrate to a hierarchy that runs System Center 2012 Configuration Manager with no service pack, the original Configuration Manager 2007 content remains on the server until it is manually removed.

However, when you migrate to a hierarchy that runs System Center 2012 Configuration Manager SP1, the original Configuration Manager 2007 content is removed after the copy of the content is converted.

A) You can migrate data from more than one source hierarchy, and the source hierarchies do not need to be the same version as each other.

This means you can migrate from one or more Configuration Manager 2007 hierarches, one or more System Center 2012 Configuration Manager hierarchies, and from one or more hierarchies that each run a different version of Configuration Manager. However, you can only migrate from one hierarchy at a time.

You can migrate the hierarchies in any order. However, you cannot migrate data from multiple hierarchies that use the same site code. If you try to migrate data from a site that uses the same site code as a migrated site, or that uses the same site code as a site in your destination hierarchy, this corrupts the data in the System Center 2012 Configuration Manager database.

A) System Center 2012 Configuration Manager supports migrating a Configuration Manager 2007 environment that is at a minimum of Service Pack 2.

A) The list of objects you can migrate depends on the version of your source hierarchy. You can migrate most objects from Configuration Manager 2007 to System Center 2012 Configuration Manager, including the following:

  • Advertisements
  • Boundaries
  • Collections
  • Configuration baselines and configuration items
  • Operating system deployment boot images, driver packages, drivers, images, and packages
  • Software distribution packages
  • Software metering rules
  • Software update deployment packages and templates
  • Software update deployments
  • Software update lists
  • Task sequences
  • Virtual application packages

When you migrate between System Center 2012 Configuration Manager hierarchies, the list is similar, and includes objects that are only available in System Center 2012 Configuration Manager, such as Applications.

Q) Can I migrate maintenance windows?

A) Yes. When a collection migrates, Configuration Manager also migrates collection settings, which includes maintenance windows and collection variables. However, collection settings for AMT provisioning do not migrate.

Q) Will advertisements rerun after they are migrated?

A) No. Clients that you upgrade from Configuration Manager 2007 will not rerun advertisements that you migrate. System Center 2012 Configuration Manager retains the Configuration Manager 2007 Package ID for packages you migrate and clients that upgrade retain their advertisement history.

Security and Role-Based Administration Interview Questions in SCCM

 The following frequently asked questions relate to security and role-based administration in Configuration Manager.

A) Because role-based administration is integrated into the configuration of the hierarchy and management functions, there is no separate documentation section for role-based administration. Instead, information is integrated throughout the documentation library.

The Configuration Manager console lists the description of each role-based security role that is installed with Configuration Manager, and the minimum permissions and suitable security roles for each management function is included as a prerequisite in the relevant topic.

Q) What is the minimum I have to configure if I don’t want to use role-based administration while I’m testing System Center 2012 Configuration Manager?

 A) If you install System Center 2012 Configuration Manager, there is no additional configuration because the Active Directory user account used to install Configuration Manager is automatically assigned to the Full Administrator security role, assigned to All Scopes, and has access to the All Systems and All Users and User Groups collections.

However, if you want to provide full administrative permissions for other Active Directory users to access System Center 2012 Configuration Manager, create new administrative users in Configuration Manager using their Windows accounts and then assign them to the Full Administrator security role.

A) Unlike Configuration Manager 2007, sites no longer provide a security boundary. Instead, use role-based administration security roles to configure the permissions different administrative users have, and security scopes and collections to define the set of objects they can view and manage.

These settings can be configured at a central administration site or any primary site and are enforced at all sites throughout the hierarchy.

Q) Should I use security groups or user accounts to specify administrative users?

 A) As a best practice, specify a security group rather than user accounts when you configure administrative users for role-based administration.

 

Q) Can I deny access to objects and collections by using role-based administration?

A) Role-based administration does not support an explicit deny action on security roles, security scopes, or collections assigned to an administrative user. Instead, configure security roles, security scopes, and collections to grant permissions to administrative users.

If users do not have permissions to objects by use of these role-based administration elements, they might have only partial access to some objects, for example they might be able to view, but not modify specific objects. However, you can use collection membership to exclude collections from a collection that is assigned to an administrative user.

Q) How do I find which object types can be assigned to security roles?

A) Run the report Security for a specific or multiple Configuration Manager objects to find the object types that can be assigned to security roles. Additionally you can view the list of objects for a security role by viewing the security roles Properties and selecting the Permissions tab.

 

Q) Can I use security scopes to restrict which distribution points are shown in the Distribution Status node in the Monitoring workspace?

 A) No, although you can configure role-based administration and security scopes so that administrative users can distribute content to selected distribution points only, Configuration Manager always displays all distribution points in the Monitoring workspace.
A) The following frequently asked questions relate to deploying and managing clients on computers and mobile devices in Configuration Manager.

Q) Does System Center 2012 Configuration Manager support the same client installation methods as Configuration Manager 2007?

A) Yes. System Center 2012 Configuration Manager supports the same client installation methods that Configuration Manager 2007 supports: client push, software update-based, group policy, manual, logon script, and image-based.

Q) What’s the minimum permission an administrative user requires for the Client Push Installation Wizard?

A) To install a Configuration Manager client by using the Client Push Installation Wizard, the administrative user must have at least the Modify resource permission.

Q) What’s the difference between upgrading clients by using the supplied package definition file and a package and program, and using automatic client upgrade that also uses a package and program?

A) When you create a package and program to upgrade Configuration Manager clients, this installation method is designed to upgrade existing System Center 2012 Configuration Manager clients.

You can control which distribution points hosts the package and the client computers that install the package. This installation method supports only System Center 2012 Configuration Manager clients and cannot upgrade Configuration Manager 2007 clients.

In comparison, the automatic client upgrade method automatically creates the client upgrade package and program and this installation method can be used with Configuration Manager 2007 clients as well as System Center 2012 Configuration Manager clients.

The package is automatically distributed to all distribution points in the hierarchy and the deployment is sent to all clients in the hierarchy for evaluation. This installation method supports System Center 2012 Configuration Manager clients and Configuration Manager 2007 clients that are assigned to a System Center 2012 Configuration Manager site.

Because you cannot restrict which distribution points are sent the upgrade package or which clients are sent the deployment, use automatic client upgrade with caution and do not use it as your main method to deploy the client software.

Q) Do references to “devices” in System Center 2012 Configuration Manager mean mobile devices?

A) The term “device” in System Center 2012 Configuration Manager applies to a computer or a mobile device such as a Windows Mobile Phone.
A) A client’s assigned site is the primary site that creates the client policy to manage the device. Clients are always assigned to primary sites, even if they roam into another primary site or reside within the boundaries of a secondary site.
The client’s installed site refers to the site that sent the client the client installation files to run CCMSetup.exe. For example, if you used the Client Push Installation Wizard, you can specify Install the client software from a specified site and select any site in the hierarchy.
The resident site refers to the site that owns the boundaries that the client currently resides in. For example, this might be a secondary site of the client’s primary site. Or, it might be another primary site if the client is roaming and temporarily connected to a network that belongs to another site in the hierarchy.

A) Yes, client status is new in System Center 2012 Configuration Manager and allows you to monitor the activity of clients and check and remediate various problems that can occur.

A) You can use compliance settings in Configuration Manager to check for additional items that you consider required for the health of your clients. For example, you might check for specific registry key entries, files, and permissions.

A) Configuration Manager contains many improvements since Configuration Manager 2007 to help you manage clients when they are on the Internet:

  • Configuration Manager supports a gradual transition to using PKI certificates, and not all clients and site systems have to use PKI certificates before you can manage clients on the Internet.
  • The certificate selection process that Configuration Manager uses is improved by using a certificate issuers list.
  • Although deploying an operating system is still not supported over the Internet, you can deploy generic task sequences for clients that are on the Internet.
  • If the Internet-based management point can authenticate the user, user polices are now supported when clients are on the Internet. This functionality supports user-centric management and user device affinity for when you deploy applications to users.
  • Configuration Manager Internet-based clients on the Internet first try to download any required software updates from Microsoft Update, rather than from an Internet-based distribution point in their assigned site. Only if this fails, will they then try to download the required software updates from an Internet-based distribution point.

A) DirectAccess is a Windows solution for managing domain computers when they move from the intranet to the Internet. This solution requires the minimum operating systems of Windows Server 2008 R2 and Windows 7 on clients.

Internet-based client management is specific to Configuration Manager, and it allows you to manage computers and mobile devices when they are on the Internet.

The Configuration Manager clients can be on workgroup computers and never connect to the intranet, and they can also be mobile devices. The Configuration Manager solution works for all operating system versions that are supported by Configuration Manager.

Unless you are using Windows Server 2012 with only Windows 8 clients for DirectAccess, both solutions require PKI certificates on clients and servers. However, DirectAccess requires a Microsoft enterprise certification authority, whereas Configuration Manager can use any PKI certificate that meets the requirements.

Not all Configuration Manager features are supported for Internet-based client management. In comparison, because a client that connects over DirectAccess behaves as if it is on the intranet, all features, with the exception of deploying an operating system, are supported by Configuration Manager.

A) Probably. You can reduce the disk space required to install the Configuration Manager client by using customized settings, such as excluding installation files that the client does not require and specifying the client cache to be smaller than the default size.

A) You can manage Intel vPro computers by using out of band management in System Center 2012 Configuration Manager.

A) AMT-based computers that were provisioned with Configuration Manager 2007 must have their provisioning data removed before you migrate them to System Center 2012 Configuration Manager, and then provisioned again by System Center 2012 Configuration Manager.

Because of functional changes between the versions, the security group, OU, and web server certificate template have different requirements:

  • If you used a security group in Configuration Manager 2007 for 802.1X authentication, you can continue to use this group if it is a universal security group. If it is not a universal group, you must convert it or create a new universal security group for System Center 2012 Configuration Manager. The security permissions of Read Members and Write Members for the site server computer account remain the same.
  • The OU can be used without modification. However, System Center 2012 Configuration Manager no longer requires Full Control to this object and all child objects. You can reduce these permissions to Create Computer Objects and Delete Computer Objects on this object only.
  • The web server certificate template from Configuration Manager 2007 cannot be used in System Center 2012 Configuration Manager without modification. This certificate template no longer uses Supply in the request and the site server computer account no longer requires Read and Enroll permissions.

Q) Is there a limit to the number of certificate templates that I can use with certificate profiles?

A) Yes, you are limited to three certificate templates per hierarchy and each of these certificate templates are restricted to the three key usages that the Network Device Enrollment Service supports: signing, encryption, and both signing and encryption. So, for example, you couldn’t use two certificate templates that supported both signing and encryption.

 

Although different servers running the Network Device Enrollment Service can be configured to use different certificate templates, Configuration Manager cannot support this configuration because you cannot assign clients to specific servers.

If you have multiple certificate registration point site system servers in the hierarchy that communicate with multiple servers running the Network Device Enrollment Service, Configuration Manager non-deterministically assigns clients to the available servers to automatically load balance the requests.

A) Do I really need Windows Server 2012 R2 to deploy certificate profiles?

A) Yes, although you do not need Windows Server 2012 R2 for the certificate registration point, you do need this operating system version (or later) to install the Configuration Manager Policy Module on the server that runs the Network Device Enrollment Service.

Before this version of the operating system, the Network Device Enrollment Service was designed for secured intranet environments only, to accept interactive computer certificate requests for network equipment such as routers.

Changes in Windows Server 2012 R2 now accommodate user certificates as well as computer certificates, and the new support for a policy module makes this solution scalable for an enterprise environment.

In addition, the increased security now supports running this service in a perimeter network (also known as a DMZ), which is important for devices that you manage on the Internet, such as iOS and Android devices.

Q) How can I tell which collections of computers have a power plan applied?

A) There is no report in System Center 2012 Configuration Manager that displays which collections of computers have a power plan applied. However, in the Device Collections list, you can select the Power Configurations column to display whether a collection has a power plan applied.

A) Yes. Wake-up proxy in Configuration Manager SP1 has its own client service named ConfigMgr Wake-up Proxy that runs separately from the SMS Agent Host (CCMExec.exe).

This service is installed when a client is configured for wake-up proxy and then new client checks make sure that this wake-up proxy service is running and that the startup type is automatic.

A) If you have enabled the wake-up proxy client setting on Configuration Manager SP1 clients, and then disable it, the ConfigMgr Wake-up Proxy service is removed from clients.

A) A manager computer for the sleeping computer’s subnet responds to the first connection attempt and wakes up the sleeping computer, which then contacts the network switch.

After the computer is awake and the network switch is updated, subsequent connection attempts will successfully connect to the destination computer. Most TCP connections automatically retry and you will not see that the first connection (and possibly additional connections) time out.

For Remote Desktop connections, however, you are more likely to see an initial failed connection and must manually retry. For computers that must come out of hibernation, you will probably experience a longer delay than for computers that are in other sleep states.

A) To better support virtual desktop infrastructure (VDI) environments and large-scale client deployments, System Center 2012 Configuration Manager has a randomization delay for scheduled activities.

This means that for scheduled activities, clients are unlikely to run the action at the exact time that you configure. In Configuration Manager SP1 only, you can use client settings to enable or disable the randomization delay for required software updates and required applications. By default, this setting is disabled.

Q) Where is the documentation for the Configuration Manager client for Mac Computers?

For System CenterA)  2012 Configuration Manager SP1 and later:

Because the management of computers that run the Mac OS X operating system is similar to managing Windows-based computers in System Center 2012 Configuration Manager, there is no separate documentation section for Mac computers. Instead, information is integrated throughout the documentation library.

Mobile Devices – SCCM Interview Questions

The following frequently asked questions relate specifically to mobile devices in Configuration Manager.

Q) If I wipe a mobile device that is enrolled by Configuration Manager and discovered by the Exchange Server connector, will it be wiped twice?

A)  No. In this dual management scenario, Configuration Manager sends the wipe command in the client policy and by using the Exchange Server connector, and then monitors the wipe status for the mobile device.
As soon as Configuration Manager receives a wipe confirmation from the mobile device, it cancels the second and pending wipe command so that the mobile device is not wiped twice.

A) Yes, if you only want to find mobile devices and retrieve inventory data from them as a read-only mode of operation, you can do this by granting a subset of the cmdlets that the account uses to connect to the Exchange Client Access server. The required cmdlets for a read-only mode of operation are as follows:

  • Get-ActiveSyncDevice
  • Get-ActiveSyncDeviceStatistics
  • Get-ActiveSyncOrganizationSettings
  • Get-ActiveSyncMailboxPolicy
  • Get-ExchangeServer
  • Get-Recipient
  • Set-ADServerSettings

A) Yes. You must specify a work or school account before you can install the Microsoft Intune connector in Configuration Manager SP1.

A) Yes. You require specific application certificates before users can install applications on Windows RT, Windows Phone 8, and iOS. You do not require certificates to make applications available to mobile devices that run Android.

Q) Do I need a my own PKI to enroll mobile devices by using Microsoft Intune?

A) No. Although the Microsoft Intune connector uses PKI certificates, Microsoft Intune automatically requests and installs these certificates for you.

A) No. Windows RT and Windows Phone 8 includes a management client that Configuration Manager uses, and Configuration Manager manages mobile devices that run iOS by directly calling APIs.

A) No. Without the Microsoft Intune connector, you can manage these devices by collecting hardware inventory, configure settings such as passwords and roaming, and remotely wipe the device. However, if you want to make company apps available to Android devices, you must install the Microsoft Intune connector.

A) No. Mobile devices that are enrolled by Configuration Manager support only required apps, so users cannot choose company apps to install. Users who have mobile devices that are enrolled by Microsoft Intune install company apps from the company portal. However, if these apps require approval, users must first request approval from the Application Catalog.

Remote Control – SCCM Interview Questions

The following frequently asked questions relate to remote control in Configuration Manager.

A) By default, remote control is disabled on client computers. Enable remote control as a default client setting for the hierarchy, or by using custom client settings that you apply to selected collections.

A) TCP 2701 is the only port that System Center 2012 Configuration Manager uses for remote control. When you enable remote control as a client setting, you can select one of three firewall profiles that automatically configure this port on Configuration Manager clients: DomainPrivate, or Public.

A) The Permitted Viewers List grants an administrative user the Remote Control permission for a computer, and the role-based administration security role of Remote Tools Operator grants an administrative user the ability to connect a Configuration Manager console to a site so that audit messages are sent when they manage computers by using remote control.

Q) Can I send a CTRL+ALT+DEL command to a computer during a remote control session?

 A) Yes. In the Configuration Manager remote control window, click Action, and then click Send Ctrl+Alt+Del.

A) You can find this out by using the remote control reports: Remote Control – All computers remote controlled by a specific user and Remote Control – All remote control information.

Q) What happened to the Remote Control program in Control Panel on Configuration Manager clients?

A) The remote control settings for System Center 2012 Configuration Manager clients are now in Software Center, on the Options tab.

SCCM Software Deployment Interview Questions

The following frequently asked questions relate to content management, software updates, applications, packages and programs, scripts, and operating system deployment with supporting task sequences and device drivers in Configuration Manager.

A) No, site servers do not compress the content that it distributes to distribution points that are enabled for bandwidth control. Whereas site-to-site transfers potentially resend files that might already be present, only to be discarded by the destination site server, a site server sends only the files that a distribution point requires. With a lower volume of data to transfer, the disadvantages of high CPU processing to compress and decompress the data usually outweigh the advantages of compressing the data.

A) System Center 2012 Configuration Manager applications contain the administrative details and Application Catalog information necessary to deploy a software package or software update to a computer or mobile device.

A) A deployment type is contained within an application and specifies the installation files and method that Configuration Manager will use to install the software. The deployment type contains rules and settings that control if and how the software is installed on client computers.

A) The deployment purpose defines what the deployment should do and represents the administrator’s intent. For example, an administrative user might require the installation of software on client computers or might just make the software available for users to install themselves. A global condition can be set to check regularly that required applications are installed and to reinstall them if they have been removed.

A) Global conditions are conditions used by requirement rules. Requirement rules set a value for a deployment type for a global condition. For example, “operating system =” is a global condition; a requirement rule is “operating system = Win7.”

A) To make a deployment optional, configure the deployment purpose as Available in the applications deployment type. Available applications display in the Application Catalog where users can install them.

A) Yes. Users can browse a list of available software in the Application Catalog. Users can then request an application which, if approved, will be installed on their computer. To make a deployment optional, configure the deployment purpose as Available in the applications deployment type.

A) Some scenarios, such as the deployment of a script that runs on a client computer but that does not install software, are more suited to using a package and program rather than an application.

A) Yes. You can configure multiple deployment types for an application. Rules that specify which deployment type is run allows you to specify how the application is made available to the user.

A) Yes. Configuration Manager collects usage statistics from client devices that can be used to automatically define user device affinities or to help you manually create affinities.

A) No. you must create a new deployment that can include extra options that include scheduling and user experience.

A) In this case, the following rules apply:

  • If both deployments have a purpose of Available, the user deployment will be installed.
  • If both deployments have a purpose of Required, the deployment with the earliest deadline will be installed.
  • If one deployment has a purpose of Available and the other deployment has a purpose of Required, the deployment with the purpose of Required will be installed.

Q) Can I migrate my existing packages and programs from Configuration Manager 2007 to a System Center 2012 Configuration Manager hierarchy?

A) Yes. You can see migrated packages and programs in the Packages node in the Software Library workspace. You can also use the Import Package from Definition Wizard to import Configuration Manager 2007 package definition files into your site.

A) Yes. In System Center 2012 Configuration Manager, the term software includes software updates, applications, scripts, task sequences, device drivers, configuration items, and configuration baselines.

A) Depending on the deployment purpose you have specified in the deployment type of an application, System Center 2012 Configuration Manager periodically checks that the state of the application is the same as its purpose.

For example, if an application’s deployment type is specified as Required, Configuration Manager reinstalls the application if it has been removed. Only one deployment type can be created per application and collection pair.

A) No, you can continue to deploy packages and programs that have been migrated from your Configuration Manager 2007 site. However, packages and programs cannot use some of the new features of System Center 2012 Configuration Manager such as requirement rules, dependencies and supersedence.

A) Deployments to users or devices are summarized based on the worst result. For example, if a deployment is successful on one device and the application requirements were not met on another device then the deployment for the user is summarized as Requirements Not Met. If none of the user’s devices has received the application, the deployment is summarized as Unknown.

A) If you don’t require HTTPS connections (for example, users will not connect from the Internet), you can use the following the quick guide instructions:

  1. Make sure that you have all the prerequisites for the Application Catalog site roles.
  2. Install the following Application Catalog site system roles and select the default options:
    • Application Catalog web service point
    • Application Catalog website point
  3. Configure the following Computer Agent device client settings by editing the default client settings, or by creating and assigning custom client settings:
    • Default Application Catalog website pointAutomatically detect
    • Add default Application Catalog website to Internet Explorer trusted site zoneTrue
    • Install PermissionsAll users

Q) How often are application deployments summarized?

A) Although you can configure the application deployment summarization interval, by default, the following values apply:

  • Deployments that were modified in the last 30 days – 1 hour
  • Deployments that were modified in the last 31 to 90 days – 1 day
  • Deployments that were modified over 90 days ago – 1 week

You can modify the application deployment summarization intervals from the Status Summarizers dialog box. Click Status Summarizers from the Sites node in the Administration workspace to open this dialog box.

A) In most cases, a deployment with an action of Uninstall will always uninstall a deployment type if it is detected unless the client type is different. For example, if you deploy a mobile device application with an action of Uninstall to a desktop computer, the deployment will fail with a status of Requirements not met as it is impossible to enforce this uninstall.

A) Although you cannot deploy a simulated and a standard deployment of an application to the same collection, you can target a computer with both if you deploy them to different collections and the computer is a member of both collections. In this scenario, for both deployments, the computer reports the results of the standard deployment. This explains how you might see deployment states for a simulated deployment that you would usually only see for a standard deployment, such as

In this scenario, for both deployments, the computer reports the results of the standard deployment. This explains how you might see deployment states for a simulated deployment that you would usually only see for a standard deployment, such as In Progress and Error.

A) You can install applications only when the write filter on the Windows Embedded device is disabled. If you try to install an application on a Windows Embedded device that has write filters enabled, you see an error message that you have insufficient permissions to install the application and the installation fails.

A) In Configuration Manager 2007, you had to use collections to identify which devices should install software, such as applications, task sequences, and software updates. In System Center 2012 Configuration Manager, you must continue to use collections for task sequences, but for applications, you can now use requirement rules as a method to control which devices install the software.

For example, you could deploy an application to the All Desktop and Server Clients collection, but include a requirement rule that specifies that the application should be installed only on computers that run Windows 8. Software updates already have this requirements capability built in, so you do not need to configure this yourself.

Although defining the requirements within the application deployment usually requires more work initially, it has longer term benefits because it reduces the administrative overhead of maintaining, using, and searching many collections. Additionally, requirements are evaluated by the client at deployment time, whereas query-based collections are evaluated periodically and often depend on the results of hardware inventory collection that might run only once a week. Another consideration when you have many collections with complex query rules is that the collection evaluation can result in noticeable CPU processing on the site server.

Additionally, requirements are evaluated by the client at deployment time, whereas query-based collections are evaluated periodically and often depend on the results of hardware inventory collection that might run only once a week. Another consideration when you have many collections with complex query rules is that the collection evaluation can result in noticeable CPU processing on the site server.

Another consideration when you have many collections with complex query rules is that the collection evaluation can result in noticeable CPU processing on the site server.

In summary, we recommend that for most application deployments, you use requirement rules instead of collections. Continue to use collections for task sequences, package and programs, testing purposes, and one-off application deployments.

A) No. Software update groups are new in System Center 2012 Configuration Manager and replace update lists that were used in Configuration Manager 2007.

A) Software update groups provide a more effective method for you to organize software updates in your environment. You can manually add software updates to a software update group or software updates can be automatically added to a new or existing software update group by using an automatic deployment rule. You can also deploy a software update group manually or automatically by using an automatic deployment rule. After you deploy a software update group, you can add new software updates to the group and they will automatically be deployed.

You can also deploy a software update group manually or automatically by using an automatic deployment rule. After you deploy a software update group, you can add new software updates to the group and they will automatically be deployed.

A) Yes. You can create automatic deployment rules to automatically approve and deploy software updates that meet specified search criteria.

A) In Configuration Manager 2007, superseded software updates are automatically expired during full software updates synchronization. In System Center 2012 Configuration Manager, you can choose to automatically expire superseded software updates during software updates synchronization just as it is in Configuration Manager 2007.

Or, you can specify a number of months before a superseded software update is expired. This allows you to deploy a superseded software update for the period of time while you validate and approve the superseding software update in your environment.

This allows you to deploy a superseded software update for the period of time while you validate and approve the superseding software update in your environment.

A) System Center 2012 Configuration Manager might automatically remove expired and superseded software updates. Consider the following scenarios:

  • Expired software updates that are not associated with a deployment are automatically removed up every 7 days by a site maintenance task.
  • Expired software updates that are associated with a deployment are not automatically removed by the site maintenance task.
  • Superseded software updates that you have configured not to expire for a specified period of time are not removed or deleted by the site maintenance task.

You can remove expired software updates from all software update groups and software update deployments so that they are automatically removed. To do this, search for expired software updates, select the returned results, choose edit membership, and remove the expired software updates from any software update group for which they are members.

A) The software update group icons are different in the following scenarios:

  • When a software update group contains at least one expired software update, the icon for that software update group contains a black X.
  • When a software update group contains no expired software updates, but at least one superseded software update, the icon for that software update group contains a yellow star.
  • When a software update group has no expired or superseded software updates, the icon for that software update group contains a green arrow.

A) The compliance percentage (Compliance %) is calculated by taking the number of users or devices with a deployment state of Success added to the number of devices with a deployment state of Requirements Not Met and then dividing this total by the number of users or devices that the deployment was sent to.

A) The following reasons might cause the numbers shown in Completions Statistics and the View Status pane to differ:

  • The completion statistics are summarized and the View Status pane displays live data – Select the deployment in the Deployments node of the Monitoring workspace and then, in the Home tab, in the Deployment group, click Run Summarization. Refresh the display in the Configuration Manager console and after summarization completes, the updated completion statistics will display in the Configuration Manager console.
  • An application contains multiple deployment types. The completion statistics display one status for the application; the View Status pane displays status for each deployment type in the application.
  • The client encountered an error. It was able to report status for the application, but not for the deployment types contained in the application. You can use the report Application Infrastructure Errors to troubleshoot this scenario.

A) When a pull-distribution point downloads content from a source distribution point, that access is counted as a client access for the purpose of this report.

A) Yes. You can use media such as a CD, DVD set, or a USB flash drive to capture an operating system image and to deploy an operating system. Deployment media includes bootable media, prestaged media, and stand-alone media.

A) Yes. When you deploy an operating system you can add steps to your task sequence that capture and restore the user state. The captured data can be stored on a state migration point or on the computer where the operating system is deployed.

A) Yes. These types of computers are referred to as unknown computers. For more information about how to deploy operating systems to unknown computers.

A) Yes. Use multicast to simultaneously send data to multiple Configuration Manager clients rather than sending a copy of the data to each client over a separate connection.

The following frequently asked questions relate to Endpoint Protection in Configuration Manager.

A) Endpoint Protection is fully integrated with System Center 2012 Configuration Manager and no longer requires a separate installation. In addition, there are a number of new features and enhancements in Endpoint Protection.

A) Yes, you can deploy Endpoint Protection definitions by using Configuration Manager software updates.

Q) Endpoint Protection than in Forefront Endpoint Protection 2010?

A) Yes, System Center 2012 Endpoint Protection uses Configuration Manager alerts to more quickly notify you when malware is detected on client computers.

SQL Server Interview Questions – Basic To Advanced

SQL SERVER INTERVIEW QUESTIONS – If you are looking for SQL Interview Questions, here is the comprehensive list from basic to most advanced SQL server interview questions for 2+, 3+, 4+, 5+ years of experienced professionals.

SQL Server Interview Questions

This list also includes concept based SQL interview questions on different topics in SQL.

 

General Relational DBMS Interview Questions

Q) What is a candidate key?

Q) What are alternate keys?

Q) What is a primary key?

Q) What is the difference between a primary key and a unique key? Are they the same?

Q) What is referential integrity?

Q) What is an Entity-Relationship Diagram (ERD)?

Q) What is a subquery?

Q) What is a correlated subquery?

Q) How do you use a subquery to find records that exist in one table and do not exist in another?

Q) What does it mean to normalize a database and why would you do it?

Q) What is denormalization?

Design and Programming Interview Questions

 Q) How can I detect whether a given connection is blocked?

Q) How would you design a database for an online site, which would average a million hits a day?

Q) You are testing the performance of a query The first time you run the query, the performance is slow  The second time you run the query, the performance is fast  Why is this?

Q) What you can do to remove data from the cache and query plans from memory for testing the performance of a query repeatedly?

Q) What is wrong in the following SQL statement?

Q) Write the fastest query to find out how many rows exist in a table

Q) The COUNT() function always returns a int value type What should you do if you need to count rows from a query which you know will return a value that is too large for an int value type?

Q) What is a derived table?

Q) You have a table with three columns: Amount1, Amount2, and Amount3 In a single row only one of these three columns will have a value and the other two will be null  Write a SQL query to retrieve the values from these columns

Q) How can you fix a poorly performing query?

Q) What is the physical representation for a many-to-many relationship?

Q) What is the maximum length of an extended property?

Q) In which database can extended stored procedures be added?

Q) Why does this query return 0?

Q) If a column is an image value type, how you can compare column values? How can you use this column in join clause?

Q) Which data type cannot be used as a parameter in a UDF?

Q) Which four data types cannot be used as a return type from a user-defined function?

Q) Can an extended stored procedure be called from inside a user-defined function?

Q) How you can make a parameterized view?

Q) How long can an Error message be in RAISEERROR function?

Q) What are the constraints on severity level in RAISEERROR?

Q) How can you log an error to the server event log from a stored procedure?

Q) Explain the Rollup operator

Q) Explain the Cube operator

Q) What is an application role and explain a scenario when you would use one?

Q) On Friday, you issued several INSERT statements using Query Analyzer. You then verified the data had been correctly entered with a SELECT statement  On Monday, your users report that the data is not there  What happened?

Q) You have two tables with a one to many join based on a field named ID. You need to find records in the parent table that are not represented in the child table  How would you accomplish this?

SQL Interview Questions For Experienced

Q) Give an example of why you would want to denormalize a database

Q) Explain extended properties

Q) You have couple of stored procedures that depend on a table You dropped the table and recreated it  What do you have to do to reestablish those stored procedure dependencies?

Q) How can you append an identity column to a temporary table?

Q) You schedule a job to run every minute What will happen if the first job runs more than 1 min? Will the second instance of the job start?

Q) Why should you use or avoid SELECT * … statements?

Q) What is wrong with this statement?

Q) You have several tables, and they are joined together for querying. The tables contain both clustered indexes and non clustered indexes  To optimize performance, how should you distribute the tables and their indexes onto different file groups?

Q) Which event (Check constraints, Foreign Key, Rule, Trigger, Primary key check) will be performed last for an integrity check?

Q) What is the fastest way to permanently delete a 1 million row table named customers?

Q) After removing a table from database, what other related objects have to be dropped explicitly?

Q) You want to check the syntax of a complicated Update SQL statement without executing it. What command should you use?

Q) You are the database developer for a leasing company. Your leasing database includes a lease table that has a column which keeps Social security numbers  Each SSN must be unique  You want the data to be physically stored in order by SSN  What constraint should you add to the SSN column on the lease table?Q) You are designing a database for your company Your Company has 10 departments and each

Q) You are designing a database for your company Your Company has 10 departments and each department has between 25 to 100 employees  Each employee may work for one or more departments  How can you represent this relationship in your ERD (entity relationship diagram)?

Q) Mary’s company is a research company that does experiments Mary’s company database includes an Experiment table  The Experiments table stores all the Experiments and their ID  There is also a Project table, which keeps all the Projects with their ID  How should the database be designed, so that an experiment cannot be repeated in a Project, but a single experiment can belong to more than one Project?

Q) John exports information periodically from a Microsoft SQL Server database to an Oracle Database  What is the best way to do this?

Q) You are designing a database for your human resources department In the employee table, there is a field for Social Security Number, which cannot contain NULL values  If no value is given, you want a value of UNKNOWN to be inserted in this field  What is the best approach?

Q) Is it true that rules do not apply to data already existing in a database at the time the rule is created?

Q) Is it true, that there is no difference between a rule and a check constraint?

Q) Can a rule be bound to any column of any data type?

Q) You are responsible for designing the physical architecture of an OLTP system. You have two tables TableA and TableB that will be joined together by several queries  You need good reliability and high performance for these queries  What should you do?Q) What is RAID, and how it can influence database performance?

Q) What is RAID, and how it can influence database performance?

Q) You work at the corporate office of a Fortune 500 company that has regional offices in 100 countries  Each regional office maintains its own customer table  This information needs to be brought to the corporate office and merged, to do some analysis for the marketing department  The marketing department also needs to uniquely identify each customer  How should you design the customer table?

Q) Explain the DBCC PINTABLE command When would you use it?

Q) You have to design a database for a manufacturing plant Among other things, this database maintains the attendance of the workshop employees who work in 3 shifts  The Attendance table should have a field named ‘Shift’, which stores the shift that the employee worked  The Workshop supervisor should be able to input only 1, 2 or 3 in this field  What is the best design, to implement this requirement?

SQL Interview Questions For 5+ Years Experienced

Q) What is a transaction and why is it important?

Q) What is deadlock?

Q) What is a livelock?

Q) How you can minimize the deadlock situation?

Q) What is the importance of concurrency control?

Q) Define Joins

Q) What is an outer join?

Q) Define a cross join?

Q) How you can change a cross join into an inner join?

Q) Define constraints and give an example of their use?

Q) Write a SQL Query to sort on different column name according to the parameters passed in the Function?

Q) What is the downside of using UDF?

Q) You have a stored procedure, which execute a lengthy batch job. This stored procedure is called from a trigger  You do not want to slow the data entry process  You do not want trigger to wait for this batch job to finish before it completes itself  What you can do to speed up the process?

Q) Write a SQL Query to delete duplicate records from a table called TABLE1

Q) What is an index?

Q) What is the preferred way to create a clustered and non-clustered index? Which index should you create first the clustered or non-clustered?

Q) Can a unique index be created on a column, which contains NULL?

Q) How would you choose between a clustered and a non-clustered index?

Q) Your table has a large character field There are queries that use this field in their search clause What should you do?

Q) What is a fill factor?

Q) When you should use a low fill factor?

Q) What are statistics?

Q) What is clustering?

Q) What is the difference between DBCC INDEXDEFRAG and DBCC REINDEX?

Q) How you can find out if an index is useful to the optimizer?

Q) Where are full-text indexes stored?

Q) How many full-text indexes can a table have?

Q) Indexes are updated automatically Is the full-text index also updated automatically?

Q) How is a full-text index updated?

Q) Can you force a query to use a specific Index?

Q) Which data type columns are the best candidates for full-text indexing?

Q) When would you prefer to have a minimum number of indexes?

Q) You created a table as follows

How you would rewrite the SQL Query to return the CUSTOMERID sorted numerically?

Q) Why is there a performance difference between two similar queries where one uses UNION and the other uses UNION ALL?

Q) You have a table ‘test’ which is a copy of northwind employee table You have written a trigger to update the field ‘HireDate’ with the current date

Q) What is the difference between OPENROWSET and OPENQUERY?

Q) How you can add messages to the NT event log from within a stored procedure?

Q) What are three ways you can use an identity value inside a trigger? Why would you prefer one way over another?

SQL Server View Interview Questions

Q) List some of the rules that apply to creating and using a ‘view’

Q) You added a row to a view, but the row is not shown on the view. Explain how this can happen, and how you can remedy the situation

Q) Can an ORDER BY clause be used in a creation of a view?

Q) ‘Order by’ is not allowed in a view How can you sort information from a view?

Q) What is a derived Table?

Q) What are Information Schema Views?

Q) What is a partitioned view?

Q) What is an Indexed View?

SQL Server Administration Interview Questions

 Q) How you can get a list of all the table constraints in a database?

Q) How you can get the list of largest tables in a database?

Q) How you can move data or databases between servers and databases in SQL Server?

Q) If no size is defined while creating the database, what size will the database have?

Q) Can a database be shrunk with users active?

As a general practice, it is recommended to have dbo be the owner of all database objects However, in your database you find number of tables owned by a user other than dbo, how could you fix this?

Q) Why does a SQL statement work correctly outside of a user-defined function, but incorrectly inside it?

Q) Can a table be moved to different Filegroup?

Q) Can a database be shrunk to 0 Bytes, if not, why?

Q) What does the Automatic recovery do?

Q) Can an automatic recovery be initiated by a user?

Q) What is the primary use of the model database?

Q) What information is maintained within the msdb database?

Q) What stored procedure can you use to display the current processes?

Q) What stored procedure would you use to view lock information?

Q) How can a database be repaired?

Q) How can you find out if the current user is a member of the specified Microsoft® Windows NT® group or Microsoft SQL Server™ role?

Q) Your SQL Server is running out of disk space. You notice that there are several large files with LDF extensions  What are these files?

Q) You notice that the transaction log on one of your databases is over 4GB The size of the data file is 2MB  What could cause this situation, and how can you fix it?

Q) You accidentally delete the MSDB database What effect does this have on your existing SQL databases, and how do you recover?

Q) Where can you add custom error messages to SQL Server?

Q) Is it important for a Database Administrator to understand the operating system and file access?

Q) What is the difference between writing data to mirrored drives versus RAID5 drives

Q) In the physical file layout, where should the transaction log be stored in relation to the data file?

Q) You have separate development and production systems You want to move a copy of a development database into production  To do this, you do a backup on the development system and restore to the production system  After a few minutes, you begin getting calls from several customers saying that they are denied access to the system  Why?

Q) What is a mixed extent?

Q) You have a table with close to 100 million records Recently, a huge amount of this data was updated  Now, various queries against this table have slowed down considerably  What is the quickest option to remedy the situation?

Q) How can you check the level of fragmentation on a table?

Q) You have developed an application which uses many stored procedures and triggers to update various tables  Users ocassionally get locking problems  Which tool is best suited to help you diagnose the problem?

Q) Which table keeps the locking information?

Q) You want to be sure that queries in a database always execute at the maximum possible speed. To achieve this goal you have created various indexes on tables  Which other statement will keep the database in good condition?

Advanced SQL Server Interview Questions

Q) During a recent migration project, John inserted 10,000 records in a table that has an Identity Column called ticketID, which automatically increases by 1 each time a record is inserted in the table  A month after the database went live; John noticed that record with ticketID 5123 has some incorrect information  So John deletes this record and decides to re-insert this record in the table  He wants to re-use the ticketID 5123  He needs to achieve this while the database is in production  What should he do?

Q) Jenny wants to export data to Pivot table in Excel spreadsheet from a table in SQL Server This data changes frequently  She wants to automate the process of updating the Excel spreadsheet using the SQL Job Scheduler  What tool is the best choice for the task?

Q) You have written an application in VB which uses SQL 7 for its database You have used many stored procedure and triggers to make your application fast  However, users complain that saving records take too much time  To rectify the problem, you start the profiler and create a trace using the trace wizard  How would you go about identifying the cause of the problem?

Q) You have a table with employee information that rarely changes However this table is used from many applications in the organization to validate the data and to produce reports  What would be the optimal fill factor to choose for indexes created on this table?

Q) What is the difference between a fill factor of 100 and 0?

Q) How will you know when statistics on a table are obsolete?

Q) Explain different backup plans

Q) What is a full backup?

Q) Explain a differential backup

Q) Explain an incremental backup

Q) What is Log shipping?

Q) Every night you run a full backup After every 3 three hours you make a differential backup  Every hour you make an incremental backup  In a worst-case scenario, how much work you can lose?

Q) Explain a Checkpoint?

Q) Explain an Automatic Checkpoint

Q) How you can list all the tables in a database?

Q) How can you list all the columns in a database?

Q) How can you list all the table constraints in a database?

Q) What are the advantages DTS has over bcp?

Q) How do you rebuild an identity column?

Q) Create a DTS package to produce a text file using the ‘UPDATE STATISTICS’ command for the tables in a database with obsolete statistics.

Q) How can you transfer data from a text file to a database table? Or how can you export data from a table to a comma delimited (CSV) file? Or how can you import data from MS Access to a table in a database? Or how can you export data from a table to an Excel file?

Q) When does the auto update index statistics feature in SQL server turn itself on?Q) What specific conditions database should meet, before you can Bulk copy data into it using BCP

Q) What specific conditions database should meet, before you can Bulk copy data into it using BCP

SQL Server Replication Interview Questions

 Q) What is database replication? What are the different types of replication you can set up in SQL Server?

Q) Which database stores information about replication?

Q) Your company has 50 branches all over the country All the branches, including the Head Office have SQL Server as the database  Every night all 50 branches upload certain information to the Head Office  Which Replication topology is best suited for the above scenario?

Q) Which of the following option(s) is(are) an inappropriate usage of merge replication: a company time sheet database, a static look up table, a high transaction based application that requires real time replication to subscribers or a company information price list that is updated at remote sites and replicated to a central databaseQ) What are the restraints imposed on the table design by a Merge Replication?

Q) What are the restraints imposed on the table design by a Merge Replication? 

SQL Server Security Interview Questions

 Q) A user is a member of the Public role and the Sales role  The Public role has select permission on all the tables  The Sales role does not have select permission on some of the tables  Will the user be able to select from all tables?

Q) If a user does not have permission to a table, but has permission to a view created on it, will he be able to view the data in table?

Q) Tony works in the Sales Department and has created a table named OrderDetail for the Sales department  You write a stored procedure which will help Mark, a sales representative, update the OrderDetail table  However, when Mark uses the stored procedure he gets an error  You realize that this is a security issue  What is required to enable Mark to use your stored procedure?

SQL Transactions Interview Questions

 Q) Define Concurrency Control

Q) What is Pessimistic Concurrency Control?

Q) What is Optimistic Concurrency Control?

Q) Explain Isolation levels

Q) What is the difference between the REPEATABLE READ and SERIALIZABLE isolation levels?

Q) What is the default isolation level in SQL server?

Q) What is the most restrictive isolation level?

Q) What is the least restrictive isolation level?

Q) How do you determine the current isolation level?

Q) What are the conditions an underlying table must satisfy before a cursor can be used by a positioned UPDATE or DELETE statement?

Q) Explain Locks

Q) Explain Lock escalation

Q) Under what condition it is possible to have a page level lock and row lock at the same time for a query?

Q) Explain how to use transactions efficiently

SQL Triggers Interview Questions

 Q) What you can do to delete a table without the delete trigger firing?

Q) Other than Truncate statement, which other command can by-pass the trigger on the tables?

Q) What are the differences between Triggers and Stored Procedures?

Q) Is this statement true: A trigger can reference objects outside the current database?

Q) Can a trigger be created on a view?

Q) Will the WRITETEXT statement activate a trigger?

Q) Can a table be created inside a Trigger?

Q) When should you use an INSTEAD OF trigger?

Q) Can the “If Update (colName)” statement be used in a delete trigger? 

Stored Procedures Interview Questions

 Q) Why should one not prefix user stored procedures with ‘sp_’?

Q) What are the results of running this script?

Q) Which table keeps information about Stored Procedures?

Q) What will be the value of @@FETCH_STATUS if a row that was a part of the cursor resultset has been deleted from the database after the time the stored procedure that opened the cursor was executed?Q) Why and when do stored procedure recompile?

Q) Why and when do stored procedure recompile?

Q) How can you find out which stored procedures are recompiling?

Q) How can you stop stored procedures from recompiling?

SQL Cursors Interview Questions

 Q) How many types of cursor type are there?

Q) What is the difference between insensitive and scroll cursor?

Q) If a table does not have a unique index, can a cursor be opened on it?

Q) Can a cursor be updated? If yes, how you can protect which columns are updated?

Q) While using a cursor, how can you differentiate between a deleted row and a row that has been inserted with NULL data values?

Concept-Based SQL Interview Questions

Q) How can you know if the row fetched from cursor is still valid in underlying table?

Q) How can you find out how many rows returned in a cursor?

Q) What does it mean if @@CURSOR_ROW returns a negative number?

Q) How can you set the threshold at which SQL Server will generate keysets asynchronously?

Q) What is the difference between Deallocate cursor and Close cursor?

Q) Define Cursor Locking

SQL Server Datatypes Interview Questions

Q) Between Cast and Convert which function would you prefer and why?

Q) What are the new data types are introduced in SQL 2000?

Q) Why it is recommended to avoid referencing a floating point column in the WHERE clause?

Q) You have to store user responses of ‘Yes’ and ‘No’ What kind of data type is best suited for this task?

Q) What is the Exact Numeric data type in SQL?

Q) Explain timestamp datatype?

Q) How can a user-defined datatype be created?

Q) What are the approximate numeric data types?

Q) You are creating an application where Users are asked their gender In the gender combo box you have three options: ‘Male’ , ‘Female’ and ‘I choose not to disclose’  These options are stored in the table as 1, 0 or NULL  Which datatype should you use?

Q) Which data types generate inaccurate results if used with an = or <> comparison in a WHERE clause of a SQL statement?

Q) Beginning with SQL Server Version 7 0, a new enhanced data type nchar was added What type of data is supported with this data type?

Q) What will happen if a column containing char type data is changed to the nchar data type?

Q) To automatically record the time on which the data was modified in a table, which data type should you choose for the column?

XML in SQL Server Interview Questions

 Q) What is XDR?

Q) What is the difference between FOR AUTO and FOR NESTED?

Q) What is the difference between FOR XML RAW and FOR XML AUTO?

Q)Explain FOR XML EXPLICIT Mode?

Q) Using the Customer, and Order table in Northwind database, Please write a query to produce XML?

Q) What is XML Schema?

Q) What is mapping schema?

Q) You have a table ‘customers’ , which has three fields, Address, CustomerID and ContactName You would like to retrieve rows as follows:

Q) What is XPath?

Q) What keyword you will use to get schema appended to the result set of a ‘for XML’ query?

 Q) Explain Active/Passive and Active/Active cluster configurations?

RELATED INTERVIEW QUESTIONS

  1. Accenture Java Interview Questions
  2. Advanced Java Interview Questions
  3. Core Java Interview Questions
  4. .NET Interview Questions
  5. Ansible Interview Questions
  6. ServiceNow Interview Questions
  7. RPA Interview Questions
  8. Blue Prism Interview Questions
  9. SSIS Interview Questions And Answers
  10. Oracle Performance Tuning Interview Questions
  11. SCCM Interview Questions
  12. ServiceNow Interview Questions
  13. SQL Interview Questions
  14. Docker Interview Questions