Tags: des style blog http color using OS dataSome of the operations of databases in SQL Server in Bulk_logged/simple mode take the form of minimizing log logging to reduce the amount of Tran log disk logs to improve overall performance.Here I'll briefly describe which operations will minimize logging in what circumstances. and how to minimize logs in a real-world production environment.concept :
Server|sqlserver
I. Application of JDBC-ODBC Bridge
1. Building databases and tables in SQL Server
2. Create a data source]
(1) Start-> Settings-> Control Panel-> admin tools->odbc Data Source
(2) Click the Add button under the User DSN to eject the Create Newdatasource dialog box
(3) Select Sqlserver-> Complete
For accidental reasons, when the inner join table is required, the corresponding field must beCase Sensitive. By default, SQL Server databases are case-insensitive. How can this problem be solved?
To achieve this, there must be at least three operation levels:
1.Database level: The entire databaseChar,Varchar,Text,Nchar,NvarcharAndNtextThe data is case sensitive. (For ease of description, the data types are
Label:In previous customer consultation cases, many client applications connected SQL Server directly with the SA account. If you are a little more strict with database management, you should not give the application this permission, usually the application only needs to make a pruning check, and very few DDL operation
all indexes in Bigdata table design principles for indexes For a table, it depends on the WHERE clause and the join expression to index the index. The principles of indexing generally include the following:
The system typically automatically builds a clustered index for the gradual field.
Consider establishing a clustered index with a large number of duplicate values and frequently scoped queries and sorting, grouped columns, or frequently accessed columns.
In a table
clause and the join expression to index the index. The principles of indexing generally include the following: The system typically automatically builds a clustered index for the gradual field. Consider establishing a clustered index with a large number of duplicate values and frequently scoped queries and sorting, grouped columns, or frequently accessed columns. In a table that often inserts operations, you should use FILLFACTOR (fill factor) to reduce page splits, while increasing the concurr
Several ASP. NET functions rely on providers to manage data storage and retrieval in data sources. Each provider is specific to a data source. ASP. NET includes a Microsoft SQL server provider for the following ASP. NET functions:
Membership (
Class ).
Role management (
Class ).
Configuration file (
Class ).
Web parts personalized settings (
Class ).
Web events (
Class)
By default, eac
does not exist, then, roll back to the SQL Server database status before the event is executed.
3. trigger function:
The trigger can be used to cascade changes to the database.
Note: 'relationship and difference between triggers and constraints'
(1) In general, the use of constraints is more efficient than the use of triggers.
(2) At the same time, the trigger can complete more complex restrictions than th
1. Create a stored procedure
Like a data table, we need to create a stored procedure before using it. Its concise syntax is:
Create proc stored procedure name
[Parameter list (multiple parameters are separated by commas (,)]
As
SQL statement
For exampleCreate proc upgetusername
@ Intuserid int,
@ Ostrusername nvarchar (20) Output -- parameters to be output
As
Begin
-- Assign the uname value to the @ ostrusername variable, that is, the parameter to be
Idx_mobiel fragment
UPDATE STATISTICS Bigdata --Update the statistics for all indexes in the Bigdata table Design principles for IndexesFor a table, it depends on the WHERE clause and the join expression to index the index. The principles of indexing generally include the following:
The system typically automatically builds a clustered index for the gradual field.
Consider establishing a clustered index with a large number of duplicate values and frequently scoped queries and so
support for extended stored proceduresSurface Area Configuration tools, surface Area Configuration tool, and features, OLE Automation: Support for OLE Automation, Microsoft SQL Server 2005Microsoft SQL Server, on the server node, right-click, select Facets, and you can see
The security system in Microsoft SQL Server is implemented at the lowest level, that is, the database itself. No matter what applications are used to communicate with SQLServer, this is the best way to control user activities. However, custom security control is sometimes required to meet the special needs of individual applications, especially when dealing with complex databases and the number of large tab
Source: http://www.study-code.com/database/sql-server/76961.htm
We know that the SQL Server transaction log is mainly used to record all the changes made to the database by all transactions. If the system fails, it will become the only source of the latest data. Log operations often have the following applications:
I.
IndexesFor a table, it depends on the WHERE clause and the join expression to index the index.The principles of indexing generally include the following:
The system typically automatically builds a clustered index for the gradual field.
Consider establishing a clustered index with a large number of duplicate values and frequently scoped queries and sorting, grouped columns, or frequently accessed columns.
In a table that often inserts operations, you should use FILLFACTOR (fill
Q: What happens to the configuration of Tempdb in RAM?
A: SQL Server provides a mechanism for storing tempdb in memory to improve system efficiency. However, if you set the value of the "Tempdb in Ram"
Causes SQL Server to fail to start properly. If you encounter this type of problem, you can:
Start
variables in SQL server use two @ signs as the prefix:
Variable
Description
@ Error
Error code for last T-SQL Error
@ Identity
ID value of the last insert operation
@ Language
Current language name
@ Max_connections
Maximum number of simultaneous connections that can be created
@ Rowcount
Nu
Implementation principle: SQL Server is used for SQL Server database connection.
Connect to the database string through sqlserver and use the "ADODB. Connection" object to connect to the access database,
Use the "ADODB. recordset" object to query an existing table, select name from sysdatabases where name = 'master
I. BACKGROUND
In the MySQL mysql.user table has saved the login user's permission information, the host and the user field is regarding the landing IP limit. But without such a table in SQL Server, what is the way SQL Server can achieve similar security-control capabilities?
SQL
Perhaps the most common mistake found in the application code is such a query request: instead of using a prepared query or program, instead of requesting data from the database using a nonparametric ad hoc query.
Not preparing your query or not using stored procedures can add unnecessary SQL Server plan caching. What is a plan cache? Simply put, it is part of t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.