Skip to main content

Performance Tuning and Optimization

1.       What are the different ways and methods of performance tuning and optimization ?
a.       Indexing
b.      Achieving
c.       Load Balancing
d.      Query Refactoring
e.      System/Resource Level Optimization (CPU,Memory,IO Configuration)
2.       What is Index ?
3.       What is Heap ?
4.       What is B-Tree/Balance Tree ?
5.       What are the kinds of Indexes ? – Clustered and Non-Clustered
6.       What are differences between Clustered and Non-Clustered Indexes ?
7.       What is execution plan / query execution plan ?
8.       What is Estimated and Actual Execution Plan ?
9.       How do you plan about Indexes in your database ?
10.   What is difference between Table scan and Index Scan ?
11.   What is Composite Index ?
12.   What is Filtered Index ?
13.   What is Fill Factor ?
14.   What is Page Split Problem in Sql Server ?
15.   What is Fragmentation , Explain ?
16.   What is difference between Index Reorganize or Rebuild ?
17.   What is Statistics or Index Statistics ?
18.   How to check and Update in Statistics ?
19.   What is Page and Extent ?
20.   What is difference between Index Seek and Index Scan ?
21.   How to enable and disable indexes in database ?
22.   Can we create clustered index without PK ?
23.   Can we create  Clustered Index without Primary Key ?
24.   Can we create Primary Key without Clustered Index ?
25.   How to recompile Stored Procedure at Run Time ?
26.   How to avoid dead locks and blocking ?
27.   What is DTA (data tuning advisory) ? How to use it for Performance Tuning ?
28.   Why we can create only one clustered index per table ?
29.   What are the pros and cons of NOLOCK ?
30.   What is Query Optimizer ?
31.   What is Data Achieving ?
32.   What is Data Purging ?
33.   What is Data and Database Partition ?
34.   What are the types of Partition ? What is Horizontal and Vertical Partition ?
35.   What is Table Partitioning ? How to perform partitioning process. Explain .
36.   What is Index Partitioning ? How to perform partitioning process. Explain .
37.   What is Indexed View or Materialized View ? Benefits of Indexed View ?
38.   How to Created Indexed View ?
39.   How do you decide about Index Maintenance , which one to rebuild and reorganize ?
40.   How to check index fragmentation ?
41.   How do we rebuild large indexes ?
42.   Where does logs get stored in SQL Server ?
43.   What is Full Text Search ? how to configure ?
44.   What is Two Phase Commit ?

45.   Does Table or Column Alias effect performance ?

Popular posts from this blog

History of MySQL from AB Corp to Cloud Database

MySQL was created by a Swedish company, MySQL AB, founded by David Axmark, Allan Larsson and Michael "Monty" Widenius. Original development of MySQL by Widenius and Axmark began in 1994. The first version of MySQL appeared on 23 May 1995. Its name is a combination of "My", the name of co-founder Michael Widenius's daughter,and "SQL", the abbreviation for Structured Query Language. ·          23 May 1995 - First internal release ·          Year 1996 - Version 3 o     Simple CRUD operations o     January 1997 Windows version was released on 8 January 1998 for Windows 95 and NT o     production release 1998, from www.mysql.com ·          Year 2002 - Version 4 o     MyISAM o     unions o     Tracking o     B-trees o     s...

How to add an article in Transactional Replication

If we have a set-up of Transactional Replication for Data Distribution running and wanting to add new object to replication on other server we can follow below process. To add an article In Transaction replication with PUSH Subscription 

Configure Impersonation Authentication in IIS8 for MVC Application

Impersonation is when ASP.NET executes code in the context of an authenticated and authorized client. By default, ASP.NET does not use impersonation and instead executes all code using the same user account as the ASP.NET process, which is typically the ASPNET account. There are 5 below steps by which we can establish Impersonation configuration in our secured application environment. 1.)    Creation of Application/Proxy user where Application is hosted. 2.)    Give appropriate access to the user. 3.)    Create Database Login user on database. 4.)    Authenticate User and provide credential on IIS. 5.)    Then Configure web.config on Application.