支持基于用户提供的模式验证XML数据,这使得应用程序开发人员和数据库管理员可以对DB2中存储的 XML 数据实施数据完整性约束。
Support for validating XML data based on user-supplied schemas, which allows application developers and database administrators to enforce data integrity constraints for XML data stored in DB2.
使用一个RI约束的主要原因是,确保当一个表引用另一个表时数据完整性得到维护。
The primary reason for using an ri constraint is to ensure that data integrity is maintained whenever one table references another.
另一方面,您可能选择根本不用这样的约束,而依靠应用程序的代码来管理自己的数据完整性。
On the other hand, you may choose not to use such constraints at all and rely on your application's code to manage its own data integrity.
这个表使用引用完整性约束确保数据的有效性。
This table USES referential integrity constraints to ensure data validity.
一致性:事务保持数据上定义的所有不变的属性(如完整性约束)。
Consistency: a transaction preserves all the invariant properties (such as integrity constraints) defined on the data.
“传统的”应用程序必须要维护存储这些数据项的表并实施完整性约束。
A 'traditional' application would need to maintain tables for each of these data items and enforce integrity rules.
验证XML(NicholasChase,developerWorks,2003 年8 月):验证文件和文档以确保数据满足完整性约束。
Validating XML (Nicholas Chase, developerWorks, August 2003): Validate files and documents to make sure that data fits integrity constraints.
在ETL过程中,即时参照完整性和检查约束极其有助于检测数据问题,在最终的数据仓库表中实现它们也不会高效。
Even though referential integrity and check constraints are very helpful during the ETL process to help detect data problems, implementing them on final data warehouse tables is not efficient.
即使恰当且一致地定义了数据模型,缺少恰当的数据值完整性约束可能会导致质量和一致性问题。
Even if the data models are defined appropriately and consistently, a lack of appropriate integrity constraints for data values can lead to quality and consistency issues.
数据仓库中的数据量使得传统引用完整性约束的成本太高。
The data volumes in data warehouse databases make traditional referential integrity constraints too costly.
通过修改隔离级别,J2EE开发人员或部署人员可以在性能的约束下平衡数据完整性,从而对应用程序进行调整。
By changing the isolation level, the J2EE developer or deployer can balance data integrity against performance constraints to performance tune the application.
另一方面,受信任的进程知道系统中存在DIFC,它们设立隐私及数据完整性控制来约束不受信任的进程。
Trusted processes, in contrast, are aware of DIFC and set up the privacy and integrity controls that constrain untrusted processes.
数据违反了一列或多列的完整性约束。
The data violated the integrity constraints for one or more columns.
ActiveRecord在使用参考完整性约束的某些场合也会出现问题,因为某些类型的关联可能连接到多个数据库表。
ActiveRecord also has trouble in some cases with referential integrity constraints because some types of associations might connect to more than one database table.
设计域完整性属性。考虑CHECK约束,数据类型和是否非空。
Design attribute domain integrity. Considerations include CHECK constraints, data types, and nullability.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。请指定要传输的对象。
Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes. Specify the object (s) to transfer.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。
You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。
You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
约束是有助于保持表中数据的完整性的规则。
Constraints are rules that help preserve the integrity of data in a table.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。
Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以复制表、数据、存储过程、引用完整性约束、安全性和索引。
Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。
Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以复制表、数据、存储过程、引用完整性约束、安全性和索引。
Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
该文提出了一类数据库系统所特有的隐通道一利用引用完整性约束传送信息的隐通道,分析了它们的带宽,并提出了处理这类隐通道的方法。
This paper presents a class of specific covert channels in database system-the covert channel using referential integrity. We compute their bandwidth and propose the methods to handle them.
应用推荐