• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/300

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

300 Cards in this Set

  • Front
  • Back
Agent Profile
A set of configuration options that are applied to a replication agent.
Alert
An object that can be created to respond to a change in the system state
Article
The most granular unit of a publication. Articles can be defined for tables, views, stored procedures and functions.
Asymmetric key
A key that conforms to the X.509 standard which can be used to encrypt data within a column
Backup Job
A scheduled job in SQL Server Agent that create the transaction log backups for a log shipping
Balanced Tree (B-Treet)
A symmetric, linear structure used to construct an index. A B-Tree provides a compact structure that enables searching very large volumes of data with a small number of read operations.
Bulk Copy Program (BCP)
A command line utility that is used to import data from a file into a table, as well as export data to a file.
BULK INSERT
A T-SQL command that allows you to import data from a file into a table view.
Certificate
A key that conforms to the X.509 standard used to encrypt data in a column as well as a database encryption key for transparent data encryption. Certificates can be backed up and restored, making them more portable than an asymmetric key.
Check Constraint
Limits the range of possible values that are allowed in a column.
Classification function
A function in the master database that assigns a workload group to each connection.
Cluster Group
A container that combines multiple cluster resources into a logical management unit.
Cluster Name
The DNS resolvable name of the cluster
Cluster Node
A piece of hardware that is capable of running a Windows cluster. It can be a physical server that is listed in the clustering section of the Windows Catalog, or a machine partition within an Enterprise-level piece of hardware (for example, Unisys ES7000)
Cluster Resource
A hardware, software, or network resource that can be configured and managed within a cluster.
Clustered Index
An index that imposes a sort order on the pages within the index. A table can have only one clustered index.
Collation Sequence
A combination of the character set that is supported and the setings for how to handle uppercase, lowercase, and accent marks.
Collection Item
A query or performance counter that you want to track in the Performance Data Warehouse
Collection Set
A group of collection items that are combined together and managed by a Data Collector
Collection Target
The instance, database or objct that a collection set is executed against.
Column Filter
Specifies filtering criteria to be applied to columns in a table or view that are replicated. This enables only a subset of columns to be replicated from publisher to subscriber.
Condition
The criteria that you want to check for a specificed facet.
Conflict Resolver
Predefined code that is employed with merge replication or transactional replication with the queued updating subscribers option to ensure that a single coherent piece of data is maintained throughout the replication architecture if changes to the same row of data are applied at multiple locations within a replication cycle.
Copy Job
A scheduled job in SQL Server Agent that copies transaction log backups from the primary to the secondary within a log shipping session.
Corrupt Page
A page that has become inconsistent due to a failure of the disk subsystem while the page was being written.
Counter log
A set of numeric values corresponding to various properties of hardware and software that can be captured using System Monitor.
Covering Index
An index that allows a query to be satisfied by using only the entries within the index.
Data Conflict
A situation that is created because of the replication engine moving changes on an asynchronous basis and different users making changes to the same row of data on both the publisher and subscriber.
Data Mining
An analytics engine that is part of SSAS which uses applied statistics to make predictions about data.
Data Provider
the connection libraries used by the Data Collector to connect to collection targets.
Database audit specification
Audit definition that applies at a database scope.
Database Mail
Allows mail messages to be sent from a SQL Server Instance
Database Master Key
Master key for the database that forms the root of the database encryption hierarchy.
Database Mirroring
A SQL Server 2009 high-availability technology configured between principal and mirror database (and an optional witness server) which maintains the close synchronization of data and the database schema and also offers that option of automatic failover.
Database Mirroring Role
Defines the operating state of each participant in a Database Mirroring session. There are three possible roles: principal, mirror and witness.
Database Mirroring session
A principal database, mirror database, and optional witness server confirgured to exchange data using one of the three available operating modes.
Database Partner
Refers to a member of a pair of principal and mirror databases participating in a Database Mirroring sessioin.
Database Revert
the restoration of a database from a database snapshot.
DDL Trigger
Code that executes when a DDL statement, such as CREATE, DROP or ALTER is executed.
Deadlock
A transient situation that occurs when two processes that are attempting to modify data acquire competing locks in such as way that does not allow either process to complete.
Default constraint
Supplies a value for a column when the application does not specify the column for an INSERT.
Differential Backup
Backup that contains all of the extents within a database that have changed since the last full backup.
Distribution Agent
The process responsible for applying snapshots for snapshot and transactional replication, as well as moving incremental changes to subscribers participating in transactional replication.
Distributor
The instance of SQL Server that contains the distribution database. Also the location where the majority of the processing overhead in a replication architecture occurs.
Dynamic Filter
A row filter that is evaluated based on parameters passed from each subscriber.
Dynamic Management Function (DMF)
A function which ships with SQL Server that provides configuration, object or diagnostic information.
Dynamic Management View (DMV)
A view which ships with SQL Server that provides configuration, object, or diagnostic informaiton.
Endpoint
A connection mechanism that is used by any process needing to access the SQL Server engine to process transactions. For Database Mirroring, you create TCP endpoints on every instance involved in the Database Mirroring session.
Facet
The .NET assemblies that define the behavior and properties available to be checked by a condition.
Filegroup
A logical definition for one or more data files. A filegroup defines a storage boundary for objects.
FILESTREAM
A property that enables SQL Server to store files in a specified directory on the operating system while still treating files as part of the database for management, backup and restore purposes.
Fixed database role
Role within a database included with SQL Server that you cannot change the security definition of.
Fixed Server Role
Role at an instance level that is included with SQL Server that you cannot change the security definition of.
Foreign Key
Enforces referential integrity between two tables.
Full Backup
A backup that captures all of the pages within a database that contain data.
Full Text Catalog
The storage container for full text indexes.
Full Text Index
A specialized index for unstructured data. Full text indexes allow unstructured data to be queried across word forms, as well as with respect to work proximity with the data.
Full Text Filter
An assembly that is loaded by the full text engine and that allows interpretation of various document formats stored within a VARBINARY (MAX) column.
Generation
A batch identifier used in merge relication to identify batches of changes on both publishers and subscribers.
Hash Algorithm
A one-way algorithm that encrypts data, but does not allow for decryption.
High Availability operating mode
The Database Mirroring operating mode that requires a principal, mirror, and witness. Synchronously transfers data from the principalto the mirror, and enables automatic failure detection and automatic failover so long as the witness server is accessible when the failure occurs.
High Performance Operation Mode
The Database Mirroring operating mode that requires only a principal and a mirror, asynchronously transfers data from the principal to the mirror, and allows only a manual failover.
High Safety Operating Mode
The Database Mirroring operating mode that requires only a principal and mirror, synchronously transfers data from the principal to the mirror and allows only for a manual failover.
Identify Column
A column with the IDENTITY property that automatically supplies an incrementing value when rows are inserted into the table.
Impersonation
The act of assuming the security credentials of another instance or database principal. Logins/Database users that are mapped to a certificat or assymetric key cannot be impersonated.
Index Alignment
An index that utilizes the same partition function as the table against which it is created.
Isolation Level
Locking behavior definted by the American National standards Institue (ANSI) which SQL Server uses to determine how the Lock Manager hsould behave
Job Step
An individual unit of work within a job.
Join Filter
A row filter that is based on join criteria between two articles within a publication.
Lock Escalation
The process by which the Lock Manager promotes a lock. Locks can be promoted from row to table or from page to table.
Log Reader Agent
The executable responsible for polling the transaction log on the publisher for changes and writing any changes to the distribution database.
Log Sequence Number (LSN)
The primary key within the transaction log. The LSN starts at 0 when the database is created, always increments, never repeats, and can never be reset to a previous value.
Log shipping session
The combination of a primary database and a secondary database whereby a continuous chain of transaction log backups is taken against the primary database and restored to the secondary database.
Loginless user
A database user that is not mapped to a login.
Mail Profile
A collectionof one or more mail account that is used to send messages using Database Mail
Majority Node Set Cluster
a cluster that stores a local copy of the quorum database on each node in the cluster. This type of cluster is supported only on Windows Server 2003 and later.
Merge Agent
The executable responsible for packaging changes to be exchanged between publisher and subscriber, as well as detecting and resolving any conflicts.
Merge Replication
A method of replication that is based on tracking changes in a set of metadata tables internal to both publisher and subscriber. Designed primarily for mobile, disconnected applications that exchange changes in both directions.
Mirror
The database within a Database Mirroring session that is in a recovering state, does not allow any connections, and is receiving changes from the principal.
Mirror Failover
The process whereby the mirror database is promoted to the principal and recovered. This process also automatically demotes the principal to become the mirror within the Database Mirroring session.
Monitor Instance
The instance that is configured to perform periodic health checks against a log shipping session.
Nonclustered index
An index that does not impose a sort order on the data pages within the table. You can have up to 1,000 nonclustered indexes in a table.
Online Restore
A filegroup restore that is performed in SQL Server 2008 Enterprise that occurs while the rest of the database remains online and accessible.
Operating Mode
The configuration that governs how a Database Mirroring session synchronizes transactions and which failover options are available. You can choose from three operating modes: High Availability, High Performance, or High Safety.
Operator
An Alias for a person, group or device that you want to send a notification to.
Ownership chain
The list of owners within a module execution claim.
Page Corruption
A scenario whereby the contents of a data page are inconsistent or have become corrupted, usually due to the failure of a Redundant Array of Inexpensive Disks (RAID) controller or Host Bus Adapter (HBA).
Partial Backup
A backup operation that backs up only the filegroups that can be written to.
Partial Restore
A filegroup restore that affects only a portion of a database.
Partition Function
A definition of boundary points that is used to determine how data in a partitioned table is split.
Partitioning Key
The column in the table that is used to partition.
Partition scheme
A definition of storage that is mapped to a partition function that determines where each portion of data will be stored.
Policy category
A container to with one or more policies can be associated.
Policy Target
The instance, database, schema, or object that you want to be checked by a policy.
Primary Database
The database that is recovered and accepting transactions within a log shipping session.
Primary key
Designates the column(s) within a table that uniquely identify every row. A primary key does not allow NULLs
Primary Server
The server hosting the instance of SQL server that is hosting the primary database.
Principal
1. An object that can own other objects within an instance. The SQL Server object that defines a security access path for a user. (2) The database within a database Mirroring session that is recovered, is online, and allows transactions to be processed against it.
Publication
The unit of exchange between publisher and subscriber that contains one or more articles.
Publisher
The designated master within a replication architecture. The publisher is considered to contain the master copy of the data.
Queue Reader Agent
The executable responsible for flushing changes made on a subscriber back to the publisher and resolving any conflicts. Used only with the queued updating subscriber option.
Quorum Database
Contains all the operational configuration information for the cluster. Also called Quorum.
Recovery Model
A database option that controls the types of backups that can be performed along with the restore options that are possible.
Reinitialization
The process by which a snapshot is regenerated and reapplied to a subscriber; it wipes out any data on the subscriber and resynchronizes it to the publisher.
Replication topology
A business diagram that shows the way data flows in a replication architecture.
Replication watermark
The last LSN that was read by the Log Reader Agent.
Republisher
A subscriber that is also configured as a publisher.
Resource Pool
The object within a Resource Governor configuration that defines the CPU and memory resources that can be allocated by a workload group.
Restore Job
A scheduled job in SQL Server Agent that restores transaction log backups to the secondary.
Row Filters
The criteria used to restrict the set of rows that are replicated for an article.
Salting
Adding a value to a piece of data prior to applying a hash algortihm as a means to obfuscate the data and deter a brute force attack.
Schema
An object within a database that every object is owned by. An object cannot be created outside a schema.
Schema Collectdion
One or more XML schemas that are loaded into SQL Server as a group. XML schemas are used to validate the contents of XML columns.
Secondary Database
The database that is unrecovered (NO RECOVERY or STANDBY) and ahs transaction log backups from the primary continuously restored to it.
Secondary Server
The server hosting the instance of sQL Server that is hosting the secondary database.
Securable
An object within an instance or database that permissions can be granted on.
Server Audit
Audit object that defines the location and logging properties for any audit specifications that are defined.
Server audit specification
Audit defintion that applies at a server scope.
Service Master Key
The symmetric key for the instance that defined by the service account and used as the root of the encryption hierarchy within an instance.
Signature
A digital signature that is applied to a code module allowing an escalation of permissions only when a module is being executed.
Snapshot Agent
The executable responsible for generating a snapshot.
Snapshot Folder
A directory used to store all the data generated by the snapshot process.
Snapshot replication
A method of replication that sends a full copy of the data defined within a publication from poublisher to subscriber.
Sparse Column
A property applied to a column that allows NULLs which optimizes storage by not requiring any space for the NULLs stored within the column.
SQL Trace
The event API that SQL Server exposes to allow you to capture information about the opertional state of an instance.
Standard Cluster
A cluster that is built with a single quorum database stored on a shared disk array.
Standby Database
See secondary database
Standby Server
See secondary server
Stemmer
An assembly loaded by the full text indexing engine that produces language specific inflectional forms for verbs within the data being indexed.
Stop List
A list of words that the full text engine should ignore when the index is populated. A stop list allows you to filter out common terms within your industry or organization so that the index does not become polluted with words you do not want to search for.
Subscriber
A database designated to receive changes from a publisher. Can be configured to enable changes to be sent back to a publisher, if desired.
Subscription
A contract between publisher and subscriber that defines the publication that will be sent to a subscriber.
Symmetric Key
A two-way key encryption algorithm that uses a single key to both encrypt and decrypt data
Tail Backup
The first step in every restore operation. A tail backup executes a final transaction log backup to save all remaining transactions in the log prior to beginning a restore sequence.
TCP endpoint
The endpoint transport that enables Transact-SQL, Database Mirroring, and Service Broker communications within SQL Server.
Tessellation
The process that is used to construct a spatial index. Tessellation counts the cells that a spatial object touches within the four-level grid hierarchy.
Thesaurus File
An XML file that is created for a specific language for use with a full text index. Thesaurus files allow you to return synonyms of searh terms, such as when you search for metal and the index also returns gold, silver, copper, aluminum, etc.
Trace Event
An action that is executed within SQL Server that is exposed via the SQL Trace API. Examples of events are a file growing, query being executed, or a connection to the instance.
Tracer Token
A specialized transaction that is used to log the latency between each component of transactional replication.
Transaction Log Chain
A continuous set of transaction log backups that can be applied to a full backup and does not provide any gaps in the transaction log sequence.
Transaction log backup
An incremental backup for a database. Contains all of the transactions that have been committed since the last transaction log backup.
Tranaction log chain
The unbroken sequence of transaction log backups taken following a full backup.
Transactional replication
A method of replication that is used to send data in one direction, from a publisher to a subscriber. This method propagates incremental changes applied to the publisher.
Transparent Client Redirect
The process that describes the functionality built into the new MDAC connection library that ships with Visual Studio 2005 and allows principal and mirror connections to be cached in the connection object. Failure of the principal causes this code to redirect a client connection to the mirror without developer intervention or custom coding.
Unique Constraint
Designates the column(s) whose values are required to be unique within the table. A unique index differs slightly from a primary key because columns for a unique index allow NULLs.
Validation
A process that is used to determine whether the publisher and subscriber are synchronized.
Witness Server
The arbiter within the High Availability operating mode, also know as a witness. The purpose of the witness is to guarantee that the database annot be served on more than one instance at the same time.
Word Breaker
A language specific assenbly that locates word breaks so that individual words can be tokenized by the full text indexing engine.
Workload File
A file or table which contains SQL statements for DTA to analyze.
Workload Group
An object used by Resource Governor to associate a connection to a resource pool.
Agent Profile
A set of configuration options that are applied to a replication agent.
Alert
An object that can be created to respond to a change in the system state
Article
The most granular unit of a publication. Articles can be defined for tables, views, stored procedures and functions.
Asymmetric key
A key that conforms to the X.509 standard which can be used to encrypt data within a column
Backup Job
A scheduled job in SQL Server Agent that create the transaction log backups for a log shipping
Balanced Tree (B-Treet)
A symmetric, linear structure used to construct an index. A B-Tree provides a compact structure that enables searching very large volumes of data with a small number of read operations.
Bulk Copy Program (BCP)
A command line utility that is used to import data from a file into a table, as well as export data to a file.
BULK INSERT
A T-SQL command that allows you to import data from a file into a table view.
Certificate
A key that conforms to the X.509 standard used to encrypt data in a column as well as a database encryption key for transparent data encryption. Certificates can be backed up and restored, making them more portable than an asymmetric key.
Check Constraint
Limits the range of possible values that are allowed in a column.
Classification function
A function in the master database that assigns a workload group to each connection.
Cluster Group
A container that combines multiple cluster resources into a logical management unit.
Cluster Name
The DNS resolvable name of the cluster
Cluster Node
A piece of hardware that is capable of running a Windows cluster. It can be a physical server that is listed in the clustering section of the Windows Catalog, or a machine partition within an Enterprise-level piece of hardware (for example, Unisys ES7000)
Cluster Resource
A hardware, software, or network resource that can be configured and managed within a cluster.
Clustered Index
An index that imposes a sort order on the pages within the index. A table can have only one clustered index.
Collation Sequence
A combination of the character set that is supported and the setings for how to handle uppercase, lowercase, and accent marks.
Collection Item
A query or performance counter that you want to track in the Performance Data Warehouse
Collection Set
A group of collection items that are combined together and managed by a Data Collector
Collection Target
The instance, database or objct that a collection set is executed against.
Column Filter
Specifies filtering criteria to be applied to columns in a table or view that are replicated. This enables only a subset of columns to be replicated from publisher to subscriber.
Condition
The criteria that you want to check for a specificed facet.
Conflict Resolver
Predefined code that is employed with merge replication or transactional replication with the queued updating subscribers option to ensure that a single coherent piece of data is maintained throughout the replication architecture if changes to the same row of data are applied at multiple locations within a replication cycle.
Copy Job
A scheduled job in SQL Server Agent that copies transaction log backups from the primary to the secondary within a log shipping session.
Corrupt Page
A page that has become inconsistent due to a failure of the disk subsystem while the page was being written.
Counter log
A set of numeric values corresponding to various properties of hardware and software that can be captured using System Monitor.
Covering Index
An index that allows a query to be satisfied by using only the entries within the index.
Data Conflict
A situation that is created because of the replication engine moving changes on an asynchronous basis and different users making changes to the same row of data on both the publisher and subscriber.
Data Mining
An analytics engine that is part of SSAS which uses applied statistics to make predictions about data.
Data Provider
the connection libraries used by the Data Collector to connect to collection targets.
Database audit specification
Audit definition that applies at a database scope.
Database Mail
Allows mail messages to be sent from a SQL Server Instance
Database Master Key
Master key for the database that forms the root of the database encryption hierarchy.
Database Mirroring
A SQL Server 2009 high-availability technology configured between principal and mirror database (and an optional witness server) which maintains the close synchronization of data and the database schema and also offers that option of automatic failover.
Database Mirroring Role
Defines the operating state of each participant in a Database Mirroring session. There are three possible roles: principal, mirror and witness.
Database Mirroring session
A principal database, mirror database, and optional witness server confirgured to exchange data using one of the three available operating modes.
Database Partner
Refers to a member of a pair of principal and mirror databases participating in a Database Mirroring sessioin.
Database Revert
the restoration of a database from a database snapshot.
DDL Trigger
Code that executes when a DDL statement, such as CREATE, DROP or ALTER is executed.
Deadlock
A transient situation that occurs when two processes that are attempting to modify data acquire competing locks in such as way that does not allow either process to complete.
Default constraint
Supplies a value for a column when the application does not specify the column for an INSERT.
Differential Backup
Backup that contains all of the extents within a database that have changed since the last full backup.
Distribution Agent
The process responsible for applying snapshots for snapshot and transactional replication, as well as moving incremental changes to subscribers participating in transactional replication.
Distributor
The instance of SQL Server that contains the distribution database. Also the location where the majority of the processing overhead in a replication architecture occurs.
Dynamic Filter
A row filter that is evaluated based on parameters passed from each subscriber.
Dynamic Management Function (DMF)
A function which ships with SQL Server that provides configuration, object or diagnostic information.
Dynamic Management View (DMV)
A view which ships with SQL Server that provides configuration, object, or diagnostic informaiton.
Endpoint
A connection mechanism that is used by any process needing to access the SQL Server engine to process transactions. For Database Mirroring, you create TCP endpoints on every instance involved in the Database Mirroring session.
Facet
The .NET assemblies that define the behavior and properties available to be checked by a condition.
Filegroup
A logical definition for one or more data files. A filegroup defines a storage boundary for objects.
FILESTREAM
A property that enables SQL Server to store files in a specified directory on the operating system while still treating files as part of the database for management, backup and restore purposes.
Fixed database role
Role within a database included with SQL Server that you cannot change the security definition of.
Fixed Server Role
Role at an instance level that is included with SQL Server that you cannot change the security definition of.
Foreign Key
Enforces referential integrity between two tables.
Full Backup
A backup that captures all of the pages within a database that contain data.
Full Text Catalog
The storage container for full text indexes.
Full Text Index
A specialized index for unstructured data. Full text indexes allow unstructured data to be queried across word forms, as well as with respect to work proximity with the data.
Full Text Filter
An assembly that is loaded by the full text engine and that allows interpretation of various document formats stored within a VARBINARY (MAX) column.
Generation
A batch identifier used in merge relication to identify batches of changes on both publishers and subscribers.
Hash Algorithm
A one-way algorithm that encrypts data, but does not allow for decryption.
High Availability operating mode
The Database Mirroring operating mode that requires a principal, mirror, and witness. Synchronously transfers data from the principalto the mirror, and enables automatic failure detection and automatic failover so long as the witness server is accessible when the failure occurs.
High Performance Operation Mode
The Database Mirroring operating mode that requires only a principal and a mirror, asynchronously transfers data from the principal to the mirror, and allows only a manual failover.
High Safety Operating Mode
The Database Mirroring operating mode that requires only a principal and mirror, synchronously transfers data from the principal to the mirror and allows only for a manual failover.
Identify Column
A column with the IDENTITY property that automatically supplies an incrementing value when rows are inserted into the table.
Impersonation
The act of assuming the security credentials of another instance or database principal. Logins/Database users that are mapped to a certificat or assymetric key cannot be impersonated.
Index Alignment
An index that utilizes the same partition function as the table against which it is created.
Isolation Level
Locking behavior definted by the American National standards Institue (ANSI) which SQL Server uses to determine how the Lock Manager hsould behave
Job Step
An individual unit of work within a job.
Join Filter
A row filter that is based on join criteria between two articles within a publication.
Lock Escalation
The process by which the Lock Manager promotes a lock. Locks can be promoted from row to table or from page to table.
Log Reader Agent
The executable responsible for polling the transaction log on the publisher for changes and writing any changes to the distribution database.
Log Sequence Number (LSN)
The primary key within the transaction log. The LSN starts at 0 when the database is created, always increments, never repeats, and can never be reset to a previous value.
Log shipping session
The combination of a primary database and a secondary database whereby a continuous chain of transaction log backups is taken against the primary database and restored to the secondary database.
Loginless user
A database user that is not mapped to a login.
Mail Profile
A collectionof one or more mail account that is used to send messages using Database Mail
Majority Node Set Cluster
a cluster that stores a local copy of the quorum database on each node in the cluster. This type of cluster is supported only on Windows Server 2003 and later.
Merge Agent
The executable responsible for packaging changes to be exchanged between publisher and subscriber, as well as detecting and resolving any conflicts.
Merge Replication
A method of replication that is based on tracking changes in a set of metadata tables internal to both publisher and subscriber. Designed primarily for mobile, disconnected applications that exchange changes in both directions.
Mirror
The database within a Database Mirroring session that is in a recovering state, does not allow any connections, and is receiving changes from the principal.
Mirror Failover
The process whereby the mirror database is promoted to the principal and recovered. This process also automatically demotes the principal to become the mirror within the Database Mirroring session.
Monitor Instance
The instance that is configured to perform periodic health checks against a log shipping session.
Nonclustered index
An index that does not impose a sort order on the data pages within the table. You can have up to 1,000 nonclustered indexes in a table.
Online Restore
A filegroup restore that is performed in SQL Server 2008 Enterprise that occurs while the rest of the database remains online and accessible.
Operating Mode
The configuration that governs how a Database Mirroring session synchronizes transactions and which failover options are available. You can choose from three operating modes: High Availability, High Performance, or High Safety.
Operator
An Alias for a person, group or device that you want to send a notification to.
Ownership chain
The list of owners within a module execution claim.
Page Corruption
A scenario whereby the contents of a data page are inconsistent or have become corrupted, usually due to the failure of a Redundant Array of Inexpensive Disks (RAID) controller or Host Bus Adapter (HBA).
Partial Backup
A backup operation that backs up only the filegroups that can be written to.
Partial Restore
A filegroup restore that affects only a portion of a database.
Partition Function
A definition of boundary points that is used to determine how data in a partitioned table is split.
Partitioning Key
The column in the table that is used to partition.
Partition scheme
A definition of storage that is mapped to a partition function that determines where each portion of data will be stored.
Policy category
A container to with one or more policies can be associated.
Policy Target
The instance, database, schema, or object that you want to be checked by a policy.
Primary Database
The database that is recovered and accepting transactions within a log shipping session.
Primary key
Designates the column(s) within a table that uniquely identify every row. A primary key does not allow NULLs
Primary Server
The server hosting the instance of SQL server that is hosting the primary database.
Principal
1. An object that can own other objects within an instance. The SQL Server object that defines a security access path for a user. (2) The database within a database Mirroring session that is recovered, is online, and allows transactions to be processed against it.
Publication
The unit of exchange between publisher and subscriber that contains one or more articles.
Publisher
The designated master within a replication architecture. The publisher is considered to contain the master copy of the data.
Queue Reader Agent
The executable responsible for flushing changes made on a subscriber back to the publisher and resolving any conflicts. Used only with the queued updating subscriber option.
Quorum Database
Contains all the operational configuration information for the cluster. Also called Quorum.
Recovery Model
A database option that controls the types of backups that can be performed along with the restore options that are possible.
Reinitialization
The process by which a snapshot is regenerated and reapplied to a subscriber; it wipes out any data on the subscriber and resynchronizes it to the publisher.
Replication topology
A business diagram that shows the way data flows in a replication architecture.
Replication watermark
The last LSN that was read by the Log Reader Agent.
Republisher
A subscriber that is also configured as a publisher.
Resource Pool
The object within a Resource Governor configuration that defines the CPU and memory resources that can be allocated by a workload group.
Restore Job
A scheduled job in SQL Server Agent that restores transaction log backups to the secondary.
Row Filters
The criteria used to restrict the set of rows that are replicated for an article.
Salting
Adding a value to a piece of data prior to applying a hash algortihm as a means to obfuscate the data and deter a brute force attack.
Schema
An object within a database that every object is owned by. An object cannot be created outside a schema.
Schema Collectdion
One or more XML schemas that are loaded into SQL Server as a group. XML schemas are used to validate the contents of XML columns.
Secondary Database
The database that is unrecovered (NO RECOVERY or STANDBY) and ahs transaction log backups from the primary continuously restored to it.
Secondary Server
The server hosting the instance of sQL Server that is hosting the secondary database.
Securable
An object within an instance or database that permissions can be granted on.
Server Audit
Audit object that defines the location and logging properties for any audit specifications that are defined.
Server audit specification
Audit defintion that applies at a server scope.
Service Master Key
The symmetric key for the instance that defined by the service account and used as the root of the encryption hierarchy within an instance.
Signature
A digital signature that is applied to a code module allowing an escalation of permissions only when a module is being executed.
Snapshot Agent
The executable responsible for generating a snapshot.
Snapshot Folder
A directory used to store all the data generated by the snapshot process.
Snapshot replication
A method of replication that sends a full copy of the data defined within a publication from poublisher to subscriber.
Sparse Column
A property applied to a column that allows NULLs which optimizes storage by not requiring any space for the NULLs stored within the column.
SQL Trace
The event API that SQL Server exposes to allow you to capture information about the opertional state of an instance.
Standard Cluster
A cluster that is built with a single quorum database stored on a shared disk array.
Standby Database
See secondary database
Standby Server
See secondary server
Stemmer
An assembly loaded by the full text indexing engine that produces language specific inflectional forms for verbs within the data being indexed.
Stop List
A list of words that the full text engine should ignore when the index is populated. A stop list allows you to filter out common terms within your industry or organization so that the index does not become polluted with words you do not want to search for.
Subscriber
A database designated to receive changes from a publisher. Can be configured to enable changes to be sent back to a publisher, if desired.
Subscription
A contract between publisher and subscriber that defines the publication that will be sent to a subscriber.
Symmetric Key
A two-way key encryption algorithm that uses a single key to both encrypt and decrypt data
Tail Backup
The first step in every restore operation. A tail backup executes a final transaction log backup to save all remaining transactions in the log prior to beginning a restore sequence.
TCP endpoint
The endpoint transport that enables Transact-SQL, Database Mirroring, and Service Broker communications within SQL Server.
Tessellation
The process that is used to construct a spatial index. Tessellation counts the cells that a spatial object touches within the four-level grid hierarchy.
Thesaurus File
An XML file that is created for a specific language for use with a full text index. Thesaurus files allow you to return synonyms of searh terms, such as when you search for metal and the index also returns gold, silver, copper, aluminum, etc.
Trace Event
An action that is executed within SQL Server that is exposed via the SQL Trace API. Examples of events are a file growing, query being executed, or a connection to the instance.
Tracer Token
A specialized transaction that is used to log the latency between each component of transactional replication.
Transaction Log Chain
A continuous set of transaction log backups that can be applied to a full backup and does not provide any gaps in the transaction log sequence.
Transaction log backup
An incremental backup for a database. Contains all of the transactions that have been committed since the last transaction log backup.
Tranaction log chain
The unbroken sequence of transaction log backups taken following a full backup.
Transactional replication
A method of replication that is used to send data in one direction, from a publisher to a subscriber. This method propagates incremental changes applied to the publisher.
Transparent Client Redirect
The process that describes the functionality built into the new MDAC connection library that ships with Visual Studio 2005 and allows principal and mirror connections to be cached in the connection object. Failure of the principal causes this code to redirect a client connection to the mirror without developer intervention or custom coding.
Unique Constraint
Designates the column(s) whose values are required to be unique within the table. A unique index differs slightly from a primary key because columns for a unique index allow NULLs.
Validation
A process that is used to determine whether the publisher and subscriber are synchronized.
Witness Server
The arbiter within the High Availability operating mode, also know as a witness. The purpose of the witness is to guarantee that the database annot be served on more than one instance at the same time.
Word Breaker
A language specific assenbly that locates word breaks so that individual words can be tokenized by the full text indexing engine.
Workload File
A file or table which contains SQL statements for DTA to analyze.
Workload Group
An object used by Resource Governor to associate a connection to a resource pool.