• It can solve data tracking and data integrity constraints to use trigger in teaching management systems.

    教学管理系统应用触发器可以解决数据追踪数据库完整性约束

    youdao

  • Support for validating XML data based on user-supplied schemas, which allows application developers and database administrators to enforce data integrity constraints for XML data stored in DB2.

    支持基于用户提供模式验证XML数据使得应用程序开发人员数据库管理员可以对DB2存储的 XML 数据实施数据完整性约束

    youdao

  • Because there is no error handling logic, you must rely on database constraints to ensure semantic integrity of the data.

    因为没有错误处理逻辑必须依靠数据库限制确保数据的语义完整性

    youdao

  • On the other hand, you may choose not to use such constraints at all and rely on your application's code to manage its own data integrity.

    一方面,可能选择根本不用这样约束依靠应用程序代码管理自己的数据完整性。

    youdao

  • Even though referential integrity and check constraints are very helpful during the ETL process to help detect data problems, implementing them on final data warehouse tables is not efficient.

    ETL过程即时参照完整性检查约束极其有助于检测数据问题,在最终的数据仓库表中实现它们不会高效

    youdao

  • This table USES referential integrity constraints to ensure data validity.

    这个使用引用完整性约束确保数据有效性

    youdao

  • Even if the data models are defined appropriately and consistently, a lack of appropriate integrity constraints for data values can lead to quality and consistency issues.

    即使恰当一致地定义数据模型缺少恰当数据完整性约束可能导致质量一致性问题

    youdao

  • The data volumes in data warehouse databases make traditional referential integrity constraints too costly.

    数据仓库中的数据使得传统引用完整性约束成本太高。

    youdao

  • Consistency: a transaction preserves all the invariant properties (such as integrity constraints) defined on the data.

    一致性事务保持数据定义所有不变属性(完整性约束)。

    youdao

  • Validating XML (Nicholas Chase, developerWorks, August 2003): Validate files and documents to make sure that data fits integrity constraints.

    验证XMLNicholasChasedeveloperWorks,2003 年8 月):验证文件文档确保数据满足完整性约束

    youdao

  • By changing the isolation level, the J2EE developer or deployer can balance data integrity against performance constraints to performance tune the application.

    通过修改隔离级别J2EE开发人员部署人员可以性能约束下平衡数据完整性,从而应用程序进行调整

    youdao

  • But when you define ri constraints, keep in mind that there are rules in place to safeguard data integrity when DML operations are performed against related tables.

    但是定义RI,要记住,当相关执行dml操作时,需要一些规则保护数据完整性

    youdao

  • The data violated the integrity constraints for one or more columns.

    数据违反了完整性约束

    youdao

  • Design attribute domain integrity. Considerations include CHECK constraints, data types, and nullability.

    设计完整性属性考虑CHECK约束数据类型是否非空

    youdao

  • Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes. Specify the object (s) to transfer.

    可以传输数据存储过程引用完整性约束安全性索引请指定传输对象

    youdao

  • And through the relationship between constraints, transaction processing to ensure data integrity.

    通过关系约束事务处置保证数据完全性

    youdao

  • You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    复制数据存储过程引用完整性约束安全性索引

    youdao

  • You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    可以复制数据存储过程引用完整性约束安全性索引

    youdao

  • You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    可以传输数据存储过程引用完整性约束安全性索引

    youdao

  • You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    复制数据存储过程引用完整性约束安全性索引

    youdao

  • You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    可以传输数据存储过程引用完整性约束安全性索引

    youdao

  • You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    可以复制数据存储过程引用完整性约束安全性索引

    youdao

  • Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    复制数据存储过程引用完整性约束安全性索引

    youdao

  • Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    复制数据存储过程引用完整性约束安全性索引

    youdao

  • Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    可以复制数据存储过程引用完整性约束安全性索引

    youdao

  • Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    可以传输数据存储过程引用完整性约束安全性索引

    youdao

  • Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    可以传输数据存储过程引用完整性约束安全性索引

    youdao

  • Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    可以复制表、数据存储过程引用完整性约束安全性索引。

    youdao

  • In the creation of a database, a data model and integrity constraints can create certainty in the structure and content of the data.

    创建数据库时数据模型完整性约束能够在数据结构内容形成确定性

    youdao

  • User Response: Execute the SET INTEGRITY statement with the IMMEDIATE CHECKED option and ensure that the data satisfies all the constraints defined on the table or the table depending on it.

    用户响应立即执行SETINTEGRITY语句版本稍有选择的,确保数据满足所有约束定义桌子

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定