8.5 use ViewContrary to the popular concept, a view is actually detrimental to performance-not necessarily because of the use of a view, but because of its common usage in a business environment. In the database model design stage, why not use the view as a performance adjustment tool? This book will explain from the perspective of
basic table. Readers can think about this: Why?
11. Intermediate tables, reports, and temporary tables
An intermediate table is a table that stores statistical data. It is designed for a data warehouse, an output report, or a query result. Sometimes it does not have a primary key or a foreign key (except a data warehouse ). Temporary tables are designed by programmers and are used by individuals to store temporary records. The base table and intermediate table are maintained by the DBA, and the
primary key andForeign key (except Data Warehouse). Temporary tables are designed by programmers to store temporary records that are used by individuals. The base table and the intermediate table are made up of the DBA dimensionand temporary tables are automatically maintained by the programmer using the program itself.12. Integrity constraints are represented in three areasDomain Integrity: Use Check to implement constraints, in the database
. The third entity here is essentially a more complex relationship that corresponds to a basic table. Generally speaking, the database design tool does not recognize many-to-many relationships, but it can handle many-to-many relationships. Example 3: In "Library information System", "book" is an entity, "reader" is also an entity. The relationship between these t
warehouse, the output report, or the query results, and sometimes it has no primary key andForeign key (except Data Warehouse). Temporary tables are designed by programmers to store temporary records that are used by individuals. The base table and the intermediate table are made up of the DBA dimensionand temporary tables are automatically maintained by the programmer using the program itself.12. Integrity constraints are represented in three areasDomain Integrity: Use Check to implement const
table. Readers can think about this: Why?
11. Intermediate tables, reports, and temporary tables
An intermediate table is a table that stores statistical data. It is designed for a data warehouse, an output report, or a query result. Sometimes it does not have a primary key or a foreign key (except a data warehouse ). Temporary tables are designed by programmers and are used by individuals to store temporary records. The base table and intermediate table are maintained by the DBA, and the te
speaking, the database design tool does not recognize many-to-many relationships, but it can handle many-to-many relationships.Example 3: In "Library information System", "book" is an entity, "reader" is also an entity. The relationship between these two entities is a typical many-to-many relationship: A book can be borrowed by multiple readers at different time
Backup tool to back up external pictures at the same time.3. File does not support SQL access permission settingsThe external file will bypass the access permissions set through the GRANT and revoke SQL statements. SQL permissions manage this access to tables and columns, but they do not apply to external files.4. Picture path is not SQL data typeThe picture path is not a SQL data type, it is just a string, and the
record, is used by the individual. The base table and the intermediate table are made up of the DBA dimensionThe program ape itself uses the program to maintain itself voluntarily.12. Completeness constraint table now three aspectsDomain Integrity: Use Check to implement constraints, in the database design tool, the field value range is defined, there is a CHEck
structures + algorithms. Although the current development of programs has gradually transitioned from process-oriented to object-oriented, I strongly agree with the formula that the teacher told us eight years ago: computer programs = data structures + algorithms. The first thing to do in object-oriented program development is to analyze the data to be processed in the entire program, extract the abstract template from it, and design the class with t
Label:relational database design for developersDirectory The origin of a Codd RDBMS12 law--rdbms Design phase of two-relational database Three design principles Four naming rules Database desi
. Generally speaking, the database design tool does not recognize many-to-many relationships, but it can handle many-to-many relationships.Example 3: In "Library information System", "book" is an entity, "reader" is also an entity. The relationship between these two entities is a typical many-to-many relationship: A book can be borrowed by multiple readers at dif
, but may also cause other transactions to be linked. This reduces efficiency, so whether vertical decomposition depends on the total efficiency of all transactions on R after decomposition is improved. Vertical decomposition needs to ensure non-destructive connectivity and maintain function dependencies, that is, to ensure that the decomposed relationship has a lossless connection and maintain function dependencies.
Data dictionary
Data dictionaries are established during the requ
, and CKT_EMPLOYEE. If the CASE tool is used, there are generally default rules, which can be modified and used on this basis.
5. perform detailed tests on database integrity according to business rules to eliminate conflicts between implicit integrity constraints and impact on performance as soon as possible.
6. A full-time database
has no primary key andForeign key (except Data Warehouse). Temporary tables are designed by programmers to store temporary records that are used by individuals. The base table and the intermediate table are made up of the DBA dimensionand temporary tables are automatically maintained by the programmer using the program itself.12. Integrity constraints are represented in three areasDomain Integrity: Use Check to implement constraints, in the database
programmers to store temporary records that are used by individuals. The base table and the intermediate table are made up of the DBA dimensionand temporary tables are automatically maintained by the programmer using the program itself.12. Integrity constraints are represented in three areasDomain Integrity: Use Check to implement constraints, in the database design to
The first thing to do in object-oriented program development is to analyze the data to be processed in the entire program, extract the abstract template from it, and design the class with this abstract template, then, add a function (algorithm) to process the data. Finally, assign access permissions to the data members and functions in the class to encapsulate the data. The original prototype of the database
to store temporary records that are used by individuals. The base table and the intermediate table are maintained by the DBA, and the temporary table is by the programmerSelf-maintenance with the program. 12. Integrity constraints are represented in three areasDomain Integrity: Use Check to implement constraints, in the database design tool, the field value ran
used by individuals. The base table and the intermediate table are maintained by the DBA, and the temporary table is by the programmerSelf-maintenance with the program.12. Integrity constraints are represented in three areasDomain Integrity: Use Check to implement constraints, in the database design tool, the field value range is defined, there is a check button
that are used by individuals. The base table and the intermediate table are maintained by the DBA, and the temporary table is by the programmerSelf-maintenance with the program.12. Integrity constraints are represented in three areasDomain Integrity: Use Check to implement constraints, in the database design tool, the field value range is defined, there is a che
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.