SQL Server
文章平均质量分 66
Jason_Steven
这个作者很懒,什么都没留下…
展开
-
Enable Ad Hoc Distributed Queries
Enable Ad Hoc Distributed Queries:exec sp_configure show advanced options,1reconfigureexec sp_configure Ad Hoc Distributed Queries,1reconfigureDisable Ad Hoc Distributed Queries:转载 2008-03-12 17:36:00 · 670 阅读 · 0 评论 -
Understanding and Managing Transaction Logs--Transaction Log Logical Architecture
The SQL Server 2005 transaction log operates logically as if the transaction log is a string of log records. Each log record is identified by a log sequence number (LSN). Each new log record is writte转载 2010-03-14 20:07:00 · 462 阅读 · 0 评论 -
Understanding and Managing Transaction Logs---Introduction to Transaction Logs
Updated: 17 July 2006 Every SQL Server 2005 database has a transaction log that records all transactions and the database modifications made by each transaction. The transaction log is a critical co转载 2010-03-14 19:50:00 · 614 阅读 · 0 评论 -
Query Tuning Recommendations
Some queries consume more resources than others. For example, queries that return large result sets and those that contain WHERE clauses that are not unique are always resource intensive. No degree of转载 2010-03-05 08:57:00 · 580 阅读 · 0 评论 -
Concurrency Effects
Users modifying data can affect other users who are reading or modifying the same data at the same time. These users are said to be accessing the data concurrently. If a data storage system has no con转载 2010-03-03 23:31:00 · 479 阅读 · 0 评论 -
Isolation Levels in the Database Engine
Transactions specify an isolation level that defines the degree to which one transaction must be isolated from resource or data modifications made by other transactions. Isolation levels are described转载 2010-03-03 23:28:00 · 654 阅读 · 0 评论 -
Types of Concurrency Control
When many people attempt to modify data in a database at the same time, a system of controls must be implemented so that modifications made by one person do not adversely affect those of another perso转载 2010-03-03 22:12:00 · 465 阅读 · 0 评论 -
Common SQL Scripts
1.查询表中第n到第m行的数据(m>n)[ID为Identity Column & Primary Key] SELECT * FROM (SELECT * ,ROW_NUMBER() OVER(ORDER BY ID ASC) as RowNumber FROM TableName) as TableAlias原创 2010-01-25 17:17:00 · 580 阅读 · 4 评论 -
SQL Server Temporary Table
Introduction Temporary tables are a useful tool in SQL Server provided to allow for short term use of data. There are two types of temporary table in SQL Server, local and global.原创 2010-01-25 18:26:00 · 1109 阅读 · 1 评论 -
Create Tables and Constraints
CREATE TABLE Department( ID INT, [Name] NVARCHAR(12) CONSTRAINT Uq_ID UNIQUE([Name])) CREATE TABLE Employee( ID INT, [Name] NVARCHAR(12) CONSTRAINT DF_Name DEFAULT(test), A原创 2010-01-25 18:13:00 · 537 阅读 · 0 评论 -
Tip/Trick: Guard Against SQL Injection Attacks 提示/技巧:防范SQL注入攻击
SQL Injection attacks are really nasty security vulnerabilities, and something all web developers (regardless of platform, technology or data layer) need to make sure they understand and protec翻译 2008-10-14 18:19:00 · 1005 阅读 · 12 评论 -
Understanding and Managing Transaction Logs--Transaction Log Physical Architecture
Updated: 14 April 2006 The transaction log in a database maps over one or more physical files. Conceptually, the log file is a string of log records. Physically, the sequence of log records is store转载 2010-03-14 20:12:00 · 532 阅读 · 0 评论