Media and Topologies

  • Centralized computing is an environment in which a mainframe computer provides data storage and computational abilities.
  • Bus topology uses a 10Base2 cable.
  • Bus topology is the easiest to implement.
  • Bus and Ring are zero fault tolerant topologies.
  • Full-mesh topology is the most fault tolerant topology.
  • Mesh topology is a type of physical network design where all devices in a network are connected to each other with many redundant connections.
  • In star topology, when a single connection to one of the network hosts fails, the failed connection will be down and the host will not have network connectivity.
  • LEDs on a network card of a client computer indicates the sending and receiving of data.
  • Continue reading

E-Commerce Site Development

  • MIME stands for Multipurpose Internet Mail Extensions. It is a standard for multi-part, multimedia electronic mail messages and World Wide Web hypertext documents on the Internet.
  • The number of hits per page will help you rank the Web pages in your site according to their popularity. The number of hits per page denotes the number of clicks on that particular page. The more the number of hits, the more popular is the page.
  • Electronic commerce (E-Commerce) includes the buying and selling of goods and services, and the transfer of funds, through digital communications.
  • E-Commerce increases efficiency, opens new markets, and can be used to communicate directly with the customer.
  • A Web site that is created should be efficient and easy to use. This is the main idea behind usability.
  • AutoComplete is a feature of a browser in which the user is provided with the options he has previously used.
  • The integration that can be used to manage data, security, etc., for the sales of goods and services conducted through the Internet is known as e-commerce.
  • Continue reading

Installing and Configuring SQL Server 2005

  • In order to change collation settings, reinstall SQL Server 2005 on a server with the same collation settings as another server.
  • In order to install SQL Server 2005 on a computer on which SQL Server 2000 is already installed, install SQL Server 2005 as a named instance.
  • Members of db_access role can assign permissions to other users to enable them to access and query the database.
  • RAID-0, also known as disk striping, is made up of a disk set in which data is divided into blocks and spread equally in each disk. It provides best performance because data read and data write operations are not limited to a single disk, but to a set of disks. It does not provide data redundancy. Data once lost cannot be recovered.
  • The Service Broker can be attached to a database by using the FOR ATTACH clause of the CREATE DATABASE statement.
  • If a snapshot of a database is present on the same computer on which the database is present, the database cannot be deleted.
  • In order to connect to the DAC, specify ADMIN: server_name in the Connect to the Server dialog box.
  • The login information stored in the master database.
  • In order to secure data that is data transmitted over a network, set the value of the ForceEncryption option on a server to Yes.
  • In order to enable a user to connect to the database, a DBA should add the user to that database.
  • The db_ddladmin fixed database role allows its members to add, modify, or drop objects in the database. Members of the db_ddladmin role can issue DDL statements (e.g. CREATE, ALTER, and DROP) in the database.
  • Member of db_ddladmin role have the permission to execute the T-SQL statements.
  • The sysadmin role allows a user to view the security log.
  • Continue reading

Developing applications that use system types and collections

  • Use the CausesValidation property of the ImageButton class to set a value to indicate whether validation is performed on a Web server control when an ImageButton control is clicked.
  • Installation packages are created for deploying a Web application by using a Web Setup project. A merge module project is used for components to be added to the application.
  • Use the Web Setup project and Deployment project to create installation packages for the deployment of Web-based applications such as XML Web services, Web applications etc., to a Web server.
  • Use a RequiredFieldValidator control to check whether or not an input control contains a value.
  • Use a RegularExpressionValidator control to check whether or not the value entered into a form field matches the pattern specified by a regular expression.
  • Use the validation error messages to be displayed on a Web page in a message box by setting the ShowMessageBox property of the ValidationSummary control to true. By setting the ValidationSummary property of the ValidationSummary control to false, the validation summary will not be displayed on the Web page.
  • Create and sort an array of data using the System namespace.
  • Continue reading

Optimizing the performance of database servers and databases

  • Memory: Pages/sec counter is used to detect whether or not the memory bottleneck is caused by I/O overhead.
  • Disk I/O bottleneck can be monitored by Physical Disk: % Disk Time and Physical Disk: Avg Disk Queue Length counters.
  • The System Monitor tool is used to know the cause of slow authentication.
  • The SQLServer: Buffer Manager performance object is used to check the amount of RAM used by a computer.
  • The Physical Disk: %Disk Time counter measures the pressure on a physical hard disk array.
  • Add more RAM if the reading of Memory: Pages/sec counter is high.
  • Reduce the Maximum Worker Thread configuration settings if the value of System: Processor Queue Length counter is high.
  • Continue reading