1. Query which stored procedures (hereinafter referred to as SP) are used by a table to:SELECT DISTINCT object_name (ID) from syscomments where ID in(select id from sysobjects where type = ' P ') and the text like '%tablename% '2. Find those
Each object created within the database (constraints, default values, logs, rules, stored procedures, and so on) occupies a single row in the table. Only within tempdb, each temporary object occupies one row in the table.Column name Data type
Overview of LocksI. Why to introduce a lockConcurrent operations on a database by multiple users can lead to inconsistencies in the following data:Missing updatesA, a, two users read the same data and modify it, and one of the user's modifications
tempdb:This is a temporary DB in SQL Server where you can declare a temporary table (#tablename) and destroy it after you run out of temporary tables.Object_ID (Object Name,object type):This function is built into SQL serve to find the object ID of
If you are already anxious, see this article, please change a posture, deep breaths several times, calm down to read this article, perhaps your problem solved.The situation I encountered was such that the site was planted on a trojan, Stole my Web.
Today to play bcp import data, there is a file format, there are Chinese string problems ... The following is the course, and share with you, hope not to go my detourThe main table is a translation table, a file containing dozens of languages, so it
Basically, installing a SQL Server single-node database is not a very difficult thing to do, most of which can be installed through next. One of the following points should be noted
Installation. net3.5 can refer to some of the installation
Let's take a look at the security model of SQL Server, first take a picture: This is the three Layer Security management system of SQL Servers, let's say that you live in a fortified community, if you want to enter your room, of course, you need to
Users in the process, due to sudden power loss, resulting in data can not be read. DBCC detection database prompts for the following errorMSG 211, Level 23, State 51, line 1thSchema corruption may have occurred. Please run DBCC CHECKCATALOG.Msg 0,
we often hear two concepts in the process of learning a database: Data redundancy and data integrity. Data redundancy refers to the existence of some duplicate data in the database, data integrity refers to the data in the database can correctly
Let's take a look at the SQL Server data type table, which lists the most common types: classification notes and description data type description binary data types store non-sub-characters and text dataImageuse to store image text data type
Original: SQL Server transaction nestingExample code:DECLARE @TranCounter INT;SET @TranCounter = @ @TRANCOUNT;IF @TranCounter > 0 --Procedure Called when there is --An active transaction. --Create a savepoint to be able -- to roll back
Set Identity_insert on -- allows the insertion of specified data on the self-increment column ID Insert into Values (1,'test') Set Identity_insert OFF -- turn off insert specified data on the self-increment column IDAttention:1.set Identity_insert
The original: A brief analysis of the differences between Fast_forword and srroll in SQL ServerThis is a brief talk about the classification of cursors.First look at the syntax of the usual cursor DECLARE cursor_name cursor [Local: Local cursor,
Some applications ( e.g. Data Warehouse system ) relies heavily on the change data recognition capabilities of the source system, which expects the source system to provide an efficient and low ability to identify change data. There was no original
as the previous article says, SQL Server provides two capabilities to implement change tracking, and this section focuses on changing Tracking functionality. ActivateChangetrackingwe can activate and use the following steps Changetracking Features:1.
ADO Connect SQL server2008 native database1. Just connect to the database and do a simple query1 using(SqlConnection conn =NewSqlConnection ("Data source=127.0.0.1; Initial catalog=mytest; User Id=sa; password=123456"))2 {3 Conn. Open ()
Transferred from: http://tech.it168.com/a2012/0110/1300/000001300144.shtmlWith the widespread popularization of Internet application, the storage and access of massive data has become the bottleneck problem of system design. For a large-scale
This is a brief talk about the classification of cursors.First look at the syntax of the usual cursor DECLARE cursor_name cursor [Local: Local cursor, valid only for current session | Global cursor, globally valid, can ] [forward_only:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.