are used by individuals. The base table and the intermediate table are maintained by the DBA, and the temporary table is by the programmerSelf-maintenance with the program.12. Integrity constraints are represented in three areasDomain Integrity: Use Check to implement constraints, in the database design tool, the field value range is defined, there is a check bu
used by individuals. The base table and the intermediate table are maintained by the DBA, and the temporary table is by the programmerSelf-maintenance with the program.12. Integrity constraints are represented in three areasDomain Integrity: Use Check to implement constraints, in the database design tool, the field value range is defined, there is a check button
space.• How to establish a reasonable index of the data table. Table indexes are almost the most effective way to improve data table query performance, and Oracle has a rich List of data table index types, and how choice is particularly important.In this paper, we focus on the index of the data table, and we will mention the other two points. Through the analysis of a simple example of library table design, the shortcomings in the
The origin of a Codd RDBMS12 law--rdbmsDesign phase of two-relational databaseThree design principlesFour naming rulesDatabase design, a cornerstone of the success of a software project. Many practitioners agree that database design is not really that important. The reality of the scene is quite similar, the number of
Label:For a Java programmer, the database must be basic use, then in the use of the process will be because many times the design unreasonable and go a lot of detours? Here are some of my personal database design experience, I hope to be useful for their follow-up study. 1. Databas
32913.2.1 maximum data protection mode: 32913.2.2 maximum performance mode 32913.2.3 maximum availability mode 33013.3 data guard and Rac 33113.4 standby database type in data guard 33213.4.1 physical standby database 33213.4.2 logical standby database 333Chapter 2 Storage Architecture Design (ASM + San) 14th14.1 ASM
Skills | design | data | database | Database design
Design of multi-user and its rights management
It is not possible to develop database management class software without considering the problem of multiuser and user rights setti
same, so you can put them in an information table Unified management, according to the prototype we can see the homepage and the company introduction page show the picture size is not the same, So you need to add a cover image address field for the first page to display the image address, and the company introduction page picture and content text can be stored together in the content field (the first page to display content, you can use the code to filter out the content of the picture), So her
Skills | design | data | database | Database design three, multi-user and the design of Rights management
It is not possible to develop database management class software without considering the problem of multiuser and user right
table field is included in a lot of data, but there is not much data in a record, or all have, this will affect the performance of the situation;How to improve the efficiency of insert?1, you can consider the use of multi-value insertion, similar to this form, insert into xxx_table () values (), (), (), but note that SQL statements form the size of the text do not exceed the database limit;2, commit transactions, can be submitted in batches, for exam
software for graphic presentation. The use of these tools and software is not critical, and I do not recommend that readers spend a lot of time on the choice of modeling methods. For most applications, the E-r diagram is sufficient to describe the relationship between entities. The key to modeling is thought, not a tool, and software is just an adjunct, and identifying entity relationships is the focus of this phase. In addition to entity relationshi
year, Tao Tao will pull me to listen to the 03 session of the database course, feel that time to listen to also more fascinated, feel the teacher also speak good, and then to our own database course, the teacher will be able to speak PPT, Just graduated graduate students who have no design experience to teach us, Gaga, at that time do not want to go to class, a
Turn from: http://blog.51cto.com/jimshu/1250066 I. Database design and performance optimization--Overview Jimshu concerns2People review5892 people reading 2013-07-16 08:02:14ObjectiveThe first time I contacted SQL Server 6.5 for Windows NT 4.0 in 1998, I felt that SQL Server was just a powerful Excel file. Now in retrospect, when I was holding such an attitude, the applications I developed should be very na
of these tools and software is not critical, and I do not recommend that readers spend a lot of time on the choice of modeling methods. For most applications, the E-r diagram is sufficient to describe the relationship between entities. The key to modeling is thought, not a tool, and software is just an adjunct, and identifying entity relationships is the focus of this phase. In addition to entity relationships, we should also consider the domain of t
this phase, we only need to analyze user activities and generate business flowcharts; determine the scope of the system to generate a general picture; analyze the data involved in user activities, generate data flowcharts; and analyze system data, generate a data dictionary. Step 3: conceptual design. The objective of conceptual design is to generate a database
system updates. If the database access is completed by a program, On the. NET platform, we only need to modify the program and copy the re-compiled Assembly xcopy to the deployed server. If a stored procedure is used, a dedicated DBA script is required to re-run the Stored Procedure for security reasons. The deployment method is limited.
I used a special table to store SQL statements in a project. To use related SQL statements, you can use keywords
obstacles to system updates. If the database access is completed by a program, On the. NET platform, we only need to modify the program and copy the re-compiled Assembly xcopy to the deployed server. If a stored procedure is used, a dedicated DBA script is required to re-run the Stored Procedure for security reasons. The deployment method is limited.
I used a special table to store SQL statements in a project. To use related SQL statements, you can u
dedicated SQL statement management tool.
The use of SQL statements cannot be avoided, and there is no final conclusion on how to better apply SQL statements. However, there is a principle that deserves our attention, that is, "try to make SQL statements exist in the specific implementation of the data access layer ".
Of course, if ORM is applied, everything will be different. The ORM framework provides basic Select, Insert, Update, and Delete operati
.
Consistency and integrity of data
To ensure consistency and completeness of the database, designers tend to design too many table associations (relation) to reduce data redundancy as much as possible. Inter-table Association is a mandatory measure that, when established, inserts, updates, and deletes for the parent table (parent table) and child table (children table) will occupy the system overhead, an
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.