MBOUMBA-MBOUMBA Yvan Evrard Anthony ST10131271 DATABASE SERVER ADMINISTRATION DBAD6010 TAKE‐HOME ASSESSMENT Question 1 Q.1.1 Q.1.2 QL Server SysPrep permits you to set up an independent occurrence of SQL Server on a PC and to finish the design sometime in the not too distant future. SQL Server SysPrep includes a two-step cycle to get to a designed independent occasion of SQL Server. The means incorporate the accompanying: Get ready Image This step stops the establishment cycle after the item doubles are introduced, without designing the PC, organization, or record explicit data for the occasion of SQL Server that is being ready. Complete Image This step empowers you to finish the design of a pre-arranged occurrence of SQL Server. During this step, you can give the PC, organization, and record explicit data. Question 2 Q.2.1 To borrow rom Corinne Bernstein (2021) 1. Smoke testing: A progression of experiments are run before the group starts more thorough tests. The point is to check that an application's principal highlights work appropriately exclusively prior to joining them. 2. Mental stability testing: This is generally finished after a smoke test and checks that all crucial highlights cooperate accurately as a framework. 3. Black box testing: The usefulness of the product under test is examined without taking a gander at the inward code structure, execution subtleties and information on interior ways of the product. 4. Reconciliation testing: Reconciliation tests are performed when different frameworks or parts should be appropriately viable to do essential usefulness. 5. Unit testing: Individual units of source code (sets of at least one PC program modules along with related control information, use methods and working systems) are tried to decide if they are good for use. 6. Client acknowledgment testing: The last period of programming testing, where genuine programming clients test the product to guarantee it can deal with required errands in genuine situations, as per determinations. Q.2.2 Master Database: Model Database: Msdb Database: Tempdb Database And the users Naive / Parametric End Users : System Analyst : Sophisticated Users : Data Base Designers Question 3 Q.3.1 Q.3.2 In Object Explorer, associate with an example of the SQL Server Database Engine and afterward grow that case. Right-click Databases, and afterward select New Database In New Database, enter a data set name. To make the data set by tolerating all default values, select OK ; in any case, go on with the accompanying discretionary advances. To change the proprietor name, select (...) to choose another proprietor Q.3.3 Question 4 Question 5 Q.5.1 As opposed to involving a solitary key as in DES, 3DES runs the DES calculation multiple times, with three 56-cycle keys : Key one is utilized to encrypt the plaintext. Key two is utilized to encrypt the text that had been scrambled by key one. Key three is utilized to encrypt the text that was unscrambled by key two. In fact, 3DES can be carried out with three different key setups. Regardless of this, the second and third choices are shaky and ought to never be executed. Keying option one : This choice purposes three free keys and is the most solid Keying option two : In this setup, the first and third keys are something similar Keying choice three :This utilizations three indistinguishable keys. At the point when indistinguishable keys are utilized, the unscrambling system in the subsequent stage counterbalances the principal encryption, passing on just the last encryption to modify the information. This makes the outcome equivalent to customary DES. (Lake Josh 2022) The Advanced Encryption Standard (AES) is a symmetric block figure picked by the U.S. government to safeguard grouped data. AES is carried out in programming and equipment all through the world to encryptsensitive information. It is fundamental for government PC security, network safety and electronic information insurance. AES incorporates three block figures : AES-128 purposes a 128-digit key length to encode and unscramble a block of messages. AES-192 purposes a 192-piece key length to scramble and decode a block of messages. AES-256 purposes a 256-bit key length to scramble and unscramble a block of messages. Question 6 Q.6.1 Q.6.2 To borrow from Jagdish Bhatta 2019, Query optimization is the general course of picking the most effective method for executing a SQL proclamation. SQL is a nonprocedural language, so the enhancer is allowed to consolidate, redesign, and process in any request. The data set enhances each SQL proclamation in light of measurements gathered about the got to information. The enhancer decides the ideal arrangement for a SQL explanation by inspecting numerous entrance techniques, for example, full table output or file examines, different join strategies. Query optimization is the main variable for any brought together social information base administration framework (RDBMS) that diminishes the complete execution season of a question. Question streamlining is the method involved with executing a SQL (Structured Query Language) inquiry in social data sets to decide the most proficient method for executing a given inquiry by considering the conceivable inquiry plans. The objective of inquiry streamlining is to advance the given question for proficiency. Cost-based inquiry streamlining thinks about various procedures in light of relative expenses (measure of time that the question needs to run) and chooses and executes one that limits the expense. The expense of a methodology is only a gauge in light of the number of assessed CPU and I/O assets that the question will utilize. In this paper, cost is considered by counting number of plate gets to for each question plan since circle access will in general be the predominant expense in question handling for concentrated social data sets. Q.6.3 According to Nikola Dimitrijevic 2017, Lock mode considers different lock types that can be applied to an asset that must be locked: -Exclusive (X) -Shared (S) -Update (U) -Intent (I) -Schema (Sch) -Bulk update (BU) Exclusive lock (X) : This lock type, when forced, will guarantee that a page or line will be held solely for the exchange that forced the restrictive lock, as long as the exchange holds the lock. The exclusive lock will be forced by the exchange when it needs to alter the page or column information, which is on account of DML proclamations DELETE, INSERT and UPDATE. A selective lock can be forced to a page or column provided that there could be no other common or elite lock forced currently on the objective. This basically implies that only one select lock can be forced to a page or line, and when forced no other lock can be forced on locked assets Shared lock (S) : this lock type, when forced, will hold a page or line to be accessible just for perusing, and that implies that some other exchange will be forestalled to change the locked record as long as the lock is dynamic. In any case, a common lock can be forced by a few exchanges simultaneously over the very page or line and in that manner a few exchanges can share the capacity for information perusing since the perusing system itself won't influence at any rate the real page or column information. Furthermore, a common lock will permit compose tasks, yet no DDL changes will be permitted Update lock (U) : this lock is like a selective lock yet is intended to be more adaptable as it were. An update lock can be forced on a record that as of now has a common lock. In such a case, the update lock will force one more shared lock on the objective column. When the exchange that holds the update lock is prepared to change the information, the update lock (U) will be changed to a select lock (X). It is essential to comprehend that update lock is deviated in respects of shared locks. While the update lock can be forced on a record that has the common lock, the common lock can't be forced on the record that as of now has the update lock Intent locks (I) : this lock is a method utilized by an exchange to illuminate one more exchange about its goal to secure a lock. The reason for such lock is to guarantee information change to be executed appropriately by forestalling one more exchange to obtain a lock on the following in order object. Practically speaking, when an exchange needs to get a lock on the column, it will secure a goal lock on a table, which is a higher order object. By gaining the goal lock, the exchange won't permit different exchanges to get the restrictive lock on that table (in any case, selective lock forced by some other exchange would drop the line lock). This is a significant lock type from the presentation perspective as the SQL Server data set motor will review aim locks just at the table level to check assuming it is workable for exchange to procure a lock in a protected way in that table, and subsequently plan lock wipes out need to examine each column/page secure in a table to ensure that exchange can gain lock on whole table Question 7 Q.7.1 IBM 2017, states that a backup and recovery technique of an exchange handling framework can have essential and optional goals. Essential targets regularly incorporate the accompanying: -Keeping up with the trustworthiness of information : Following a blunder, a district should -reestablish the information to a reliable known state with an insignificant loss of refreshed information. -By tracking changes that are made to an asset while a locale is running typically, the district can utilize this data to recuperate the information when a blunder happens. -Limiting the impacts of blunders on end clients : Where conceivable, a mistake that influences just a single end client, one application, or one data set should not make the entire district end. Moreover, assuming handling for one end client is compelled to stop rashly, the district should have the option to pull out current information base updates that were performed by that end client. -Reestablishing administrations as fast as could be expected: If handling for the entire area ends, many end clients can have their refreshing work intruded. On a resulting district startup, the locale should pull out just those exchange refreshes that were in process (in-flight) at the hour of the blunder. This makes restart speedier, and decreases how much information that the end client must reemerge. Coming up next are run of the mill optional targets for a reinforcement and recuperation procedure: -To anticipate and control how long assistance is inaccessible due to different disappointment systems. -To test reinforcement and recuperation methodology. -To forestall working framework record frameworks from loading up with log documents. Assuming the document framework that gets log information from CICS® turns out to be full, CICS ends unusually. -To guarantee consistent accessibility. For instance, when you take typical intermittent reinforcements, administration should proceed. -To give resistance of specific kinds of equipment disappointments, like an unexpected plate disappointment or an organization disappointment, with the goal that no deficiency of administration happens. -To give a robotized restart ability, for example, restarting the framework on another processor on the off chance that the primary processor becomes blemished. -To keep up with consistency in an interoperation administration. For instance, assuming you have a climate where at least two ventures run their own document the board benefits, the work that is finished by exchanges should not become conflicting between the various undertakings, in any event, when a few kinds of equipment disappointment happen. We will consider: Cost Reinforcement area Reinforcement methode Reinforcement (and recuperation) adaptability Reinforcement plan Versatile Reinforcement security Q.7.2 A backup server is a server type that works with support up information, data sets, and applications on a devoted on-premises or far off server. It incorporates both programming and equipment advancements that are required for compelling reinforcement information capacity and recovery administration to associated PCs, gadgets, or servers. A backup serverserver could appear to be an extra cost for associations, however in the more extended run, it ensures business security from any sort of catastrophe. Following are the key benefits related with the reinforcement server : 1- Dependable Data Protection Imagine a scenario where your association gets hit by a digital assault, cataclysmic event, equipment glitch, inadvertent erasure, or other such episodes, and it caused huge information misfortune. In the event that you didn't have a reinforcement set up, then, at that point, how might you recuperate your information ? With a reinforcement server, you are continuously making a copy of your association's pivotal information, so regardless of whether your association experiences an issue causing information misfortune, then your reinforcement arrangement will be there to safeguard you. 2- Improved Security for Important Data Associations today are gathering an uncommon measure of information, which incorporates both imperative data for extricating business experiences and insignificant information. The information that is crucial for business ought to be reared up to guarantee that it tends to be reestablished in the hour of need. A reinforcement server is such a reinforcement media where you can constantly and consequently store your information pivotal for business and furthermore make it scrambled for upgraded security. Along these lines, you are having different duplicates of the information, which brings information assurance and information security. 3- Prompt Recovery of Data Having reinforcement frameworks doesn't just imply that you can have a reinforcement of information in a split second, yet it likewise implies that you can likewise recuperate that information rapidly. In this way, in the event that you have lost business significant information, then you should simply need to get to the recuperation drive and reestablish back the information. 4- Plausibility of File Versioning Document forming implies that you can store various renditions of a record as it gets refreshed. For instance, you supported up a record 4 days prior and from that point forward its refreshed variant is getting upheld up constantly. In any case, rather than overwriting the current document, it stores a similar record independently. Along these lines, you can have different forms of the document and can without much of a stretch reestablish back any past variant. To have record forming in a reinforcement server, you can set up your reinforcement programming to guarantee document forming, or on the other hand assuming you are searching for the reinforcement administrations of an outsider cloud stage, then, at that point, you can decide on that stage that gives document forming support. (Backup Everything 2022) The disadvantages: You really want to burn through cash for a reinforcement stockpiling gadget or administration. You could get indiscreet with information — "No problem, I have a reinforcement." You can't get to your information on the off chance that you don't have Internet access. Transfer speed issues - you would like the right measure of transmission capacity to copy huge lumps of data. Full information recuperation could take some time - recuperating little amounts of information is quick and direct. Yet, full recuperations could gobble up your time and stress the neighborhood frameworks. Question 8 Q.8.1 SQL Server Integration Services is a stage for building endeavor level information reconciliation and information changes arrangements. Use Integration Services to tackle complex business issues by duplicating or downloading documents, stacking information distribution centers, purifying and mining information, and overseeing SQL Server items and information. Q.8.2 1. Prospecting The first move toward quite a while interaction is prospecting. In this stage, you track down likely clients and decide if they have a requirement for your item or administration and whether they can bear the cost of what you offer. Assessing whether the clients need your item or administration and can bear the cost of it is known as qualifying. Remember that, in present day deals, finding one possibility at an organization: There are a normal of 6.8 clients partners engaged with a commonplace buy, so you'll need to rehearse multi-stringing, or associating with numerous chiefs on the buying side is sufficiently not. Account maps are a successful approach to recognizing these purchasers. 2. Readiness The following stage is getting ready for beginning contact with a likely client, investigating the market and gathering all pertinent data in regards to your item or administration. Foster your business show and designer it to your expected client's specific necessities. Readiness is critical to getting you in a good position. The more you comprehend your possibility and their requirements, the more you can address their complaints and put yourself aside from the opposition. 3. Approach Then, connect with your client. This is known as the methodology. Some of the time this is an up close and personal gathering, once in a while it's via telephone. There are three normal methodology strategies. Premium methodology: Presenting your possible client with a gift toward the start of your collaboration Question approach: Asking an inquiry to get the possibility intrigued Item approach: Giving the possibility an example or a free preliminary to survey and assess your administration Presentation In the show stage, you effectively exhibit how your item or administration addresses the issues of your expected client. The word show infers utilizing PowerPoint and giving a salesy routine, yet it doesn't necessarily in every case must be like that — you ought to effectively pay attention to your client's requirements and afterward act and answer as needs be. 5. Taking care of complaints Maybe the most underestimated step of the deals interaction is taking care of protests. This is where you pay attention to your possibility's interests and address them. It's additionally where numerous ineffective sales reps exit the cycle — 44% of sales reps forsaking pursuit after one dismissal, 22% after two dismissals, 14% after three, and 12% after four, despite the fact that 80% of deals expect something like five subsequent meet-ups to change over. Effectively dealing with complaints and easing concerns isolates great sales reps from awful and extraordinary from great. 6. Shutting In the end stage, you get the choice from the client to push ahead. Contingent upon your business, you could attempt one of these three shutting strategies. Elective decision close : Assuming the deal and offering the possibility a decision, where the two choices close the deal — for instance, "Will you be paying the entire expense front and center or in portions ?" or "Will that be money or charge ?" Additional incitement close : Offering a bonus to get the possibility to close, like a free month of administration or a rebate Standing room just close : Creating earnestness by communicating that there's no time to waste — for instance, "The cost will be going up after this month" or "We just have six spots left" 7. Follow-up Whenever you have brought the deal to a close, your occupation isn't finished. The subsequent stage keeps you in touch with clients you have shut, for potential recurrent business as well as for references also. Also, since holding current clients is six to multiple times less exorbitant than securing new ones, it is critical to keep up with connections. (Lucidchart 2022) Question 9 Q.9.1 Database performance monitoring is compulsory on the off chance that you're answerable for the wellbeing and execution of utilizations and their fundamental framework. Slow inquiries can immensely affect your application's general exhibition. It's vital to rapidly recognize those sluggish questions, so they can be gotten to the next level. Q.9.2 Since the code characterizes a cycle that is free of the particular SQL explanations utilized. Q.9.3 1. In Object Explorer, extend the data set where you need to make the review determination. 2. Extend the Security envelope. 3. Right-click the Database Audit Specifications organizer and select New Database Audit Specification. 4. At the point when you complete the process of choosing choices, select OK. You can utilize SQL Server Management Studio or Transact-SQL to characterize a review. After the review is made and empowered, the objective will get passages. You can peruse the Windows occasion logs by involving the Event Viewer utility in Windows. List of references : Lake J.2022. What is 3des encryption and how does des work?[Online] Available at : https://www.comparitech.com/blog/information-security/3desencryption/#:~:text=Rather%20than%20using%20a%20single,was%20decrypted%20by%20key%20t wo. [ Accessed 28 June 2023] Jagdish B. 2019. Cost-based query optimization in centralized relational databases .[Online] Available at : https://www.nepjol.info/index.php/JIST/article/view/24627 [ Accessed 28 June 2022] Nikola D. 2017. All about locking in sql server. [Online] Available at : https://www.sqlshack.com/locking-sql-server/ [ Accessed 28 June 2022] IBM. 2017. Objectives of backup and recovery. [Online] Available at : https://www.ibm.com/docs/en/txseries/9.1?topic=SSAL2T_9.1.0/com.ibm.cics.tx.doc/concepts/c_b ckup_recovery_objective.html [ Accessed 28 June 2022] Backup Everything .2022. What are the advantages of backup server ? [Online] Available at : https://backupeverything.co.uk/what-are-the-advantages-of-backup-server/ [ Accessed 28 June 2022] Lucidchart. 2022. 7-step sales process : when to use it and when to break it [Online] Available at : https://www.lucidchart.com/blog/what-is-the-7-step-sales-process [ Accessed 28 June 2022] Bernstein C. 2021. functional testing. [Online] Available at : https://www.techtarget.com/searchsoftwarequality/definition/functional-testing [ Accessed 28 June 2022]