未(恰当)定义或执行完整性约束。
Integrity constraints are not (appropriately) defined or enforced.
单击add添加一个新的安全性约束。
数据违反了一列或多列的完整性约束。
The data violated the integrity constraints for one or more columns.
XML闭包依赖是基本的完整性约束。
XML inclusion dependency is essential integrity constraints.
基于子元素的某些属性可以表示惟一性约束。
You can express uniqueness constraints based on certain attributes of child elements.
混合版本单元的版本5节点中的临时性约束。
Temporary restrictions on Version 5 nodes in the mixed release cell.
这个表使用引用完整性约束确保数据的有效性。
This table USES referential integrity constraints to ensure data validity.
输入您希望添加安全性约束的war文件的位置。
Enter the location of the war file that you want to add security constraints to.
我们为完整的 DADX组创建一个安全性约束。
安全性约束类似于数据库中的“GRANT”语句。
Security constraints are similar to "GRANT" statements in the database.
清单5.web . xml中的安全性约束。
数据仓库中的数据量使得传统引用完整性约束的成本太高。
The data volumes in data warehouse databases make traditional referential integrity constraints too costly.
在这种情况下,特别是天然的复杂性约束是有限的内存。
In this case, a particular natural complexity constraint is limited memory.
简单的例子比如典型的名称唯一性约束、类型检查或非空检查。
Simple examples include the typical name-uniqueness constraints, type checks or non-nullness.
举个例子,比方说,只需要检查某种类型的约束,例如结构性约束。
An example is that only a certain type of constraint needs to be checked such as structural constraints.
一致性:事务保持数据上定义的所有不变的属性(如完整性约束)。
Consistency: a transaction preserves all the invariant properties (such as integrity constraints) defined on the data.
“传统的”应用程序必须要维护存储这些数据项的表并实施完整性约束。
A 'traditional' application would need to maintain tables for each of these data items and enforce integrity rules.
这种复杂性约束在第三章中指出听众不能同时加工处理超过两种以上的证据。
The complexity constraint in Chapter 3 is that the listener cannot process more than two pieces of evidence.
触发器并不像参照完整性约束和检查约束那样,我们甚至可以使用对其他表来进行更新。
Triggers, unlike referential and check constraints, can even be used to update other tables.
ccd表中必须有惟一性约束——可以通过主键或者源表或ccd表上的惟一索引实现。
Uniqueness in the CCD table must be enforced — either by a primary key or unique index on the source table or CCD table.
即使恰当且一致地定义了数据模型,缺少恰当的数据值完整性约束可能会导致质量和一致性问题。
Even if the data models are defined appropriately and consistently, a lack of appropriate integrity constraints for data values can lead to quality and consistency issues.
推荐:为带有参照完整性约束的别名使用“noload”选项,并在复制管理工具外部装入目标表。
Recommendation: Use the "no load" option for nicknames with referential integrity constraints and load the target table outside of the replication administration tools.
如果表的主键或惟一性约束中指定了这个列,那么不允许使用这个子句(SQLSTATE 42831)。
This clause is not allowed if the column is specified in the primary key, or in a unique constraint of the table (SQLSTATE 42831).
同样,在执行装入操作期间,QApply程序也不删除别名上的参照完整性约束,并在这之后恢复它们。
Also, the Q Apply program does not drop referential integrity constraints on nicknames during the loading process and then restore them.
任何gnosis . xml . validity类只能用符合xml方言有效性约束的参数进行实例化。
Any gnosis.xml.validity class can only be instantiated with arguments obeying XML dialect validity constraints.
这个主体是作为J2EE上下文来建立的,所以我们可以确保在服务实现中定义的安全性约束在分派组件之前得到满足。
The principal is established as the J2EE context so that we can ensure that the security constraints that are defined on the service implementation are met before dispatching the component.
您可以用其它编程语言创建类似的功能,但Python提供了非常通用的反射机制,而且能够清晰地表达有效性约束。
You could create an analogous capability in other programming languages, but Python provides particularly versatile reflection mechanisms, and allows clear expression of validity constraints.
ActiveRecord在使用参考完整性约束的某些场合也会出现问题,因为某些类型的关联可能连接到多个数据库表。
ActiveRecord also has trouble in some cases with referential integrity constraints because some types of associations might connect to more than one database table.
根据web. xml文件中指定的安全性约束,通常会定义一个或多个角色,这些角色的用户将拥有访问这些脚本的适当权限。
You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.
SOP是一种安全性约束,它实际上禁止从某个源(即URL的协议/主机/端口三元组)装载的页面访问来自不同源的数据。
The SOP is a security restriction that basically forbids a page loaded from a certain origin (meaning the protocol/host/port trio of the URL) to access data from a different origin.
应用推荐