• 支持基于用户提供模式验证XML数据使得应用程序开发人员数据管理员可以对DB2存储的 XML 数据实施数据完整性约束

    Support for validating XML data based on user-supplied schemas, which allows application developers and database administrators to enforce data integrity constraints for XML data stored in DB2.

    youdao

  • 使用RI约束主要原因确保引用另一个表时数据完整性得到维护。

    The primary reason for using an ri constraint is to ensure that data integrity is maintained whenever one table references another.

    youdao

  • 一方面,可能选择根本不用这样约束依靠应用程序代码管理自己数据完整性

    On the other hand, you may choose not to use such constraints at all and rely on your application's code to manage its own data integrity.

    youdao

  • 这个使用引用完整性约束确保数据有效性

    This table USES referential integrity constraints to ensure data validity.

    youdao

  • 一致性事务保持数据定义所有不变属性(完整性约束)。

    Consistency: a transaction preserves all the invariant properties (such as integrity constraints) defined on the data.

    youdao

  • 传统应用程序必须维护存储这些数据实施完整性约束

    A 'traditional' application would need to maintain tables for each of these data items and enforce integrity rules.

    youdao

  • 验证XMLNicholasChasedeveloperWorks,2003 年8 月):验证文件文档确保数据满足完整性约束

    Validating XML (Nicholas Chase, developerWorks, August 2003): Validate files and documents to make sure that data fits integrity constraints.

    youdao

  • ETL过程即时参照完整性检查约束极其有助于检测数据问题,在最终数据仓库表中实现它们不会高效

    Even though referential integrity and check constraints are very helpful during the ETL process to help detect data problems, implementing them on final data warehouse tables is not efficient.

    youdao

  • 即使恰当一致地定义数据模型缺少恰当数据完整性约束可能导致质量一致性问题

    Even if the data models are defined appropriately and consistently, a lack of appropriate integrity constraints for data values can lead to quality and consistency issues.

    youdao

  • 数据仓库中的数据使得传统引用完整性约束成本太高。

    The data volumes in data warehouse databases make traditional referential integrity constraints too costly.

    youdao

  • 通过修改隔离级别J2EE开发人员部署人员可以性能约束平衡数据完整性,从而应用程序进行调整

    By changing the isolation level, the J2EE developer or deployer can balance data integrity against performance constraints to performance tune the application.

    youdao

  • 另一方面,受信任进程知道系统存在DIFC,它们设立隐私数据完整性控制约束不受信任的进程。

    Trusted processes, in contrast, are aware of DIFC and set up the privacy and integrity controls that constrain untrusted processes.

    youdao

  • 数据违反了完整性约束

    The data violated the integrity constraints for one or more columns.

    youdao

  • ActiveRecord在使用参考完整性约束某些场合也会出现问题,因为某些类型的关联可能连接多个数据

    ActiveRecord also has trouble in some cases with referential integrity constraints because some types of associations might connect to more than one database table.

    youdao

  • 设计完整性属性考虑CHECK约束数据类型是否非空

    Design attribute domain integrity. Considerations include CHECK constraints, data types, and nullability.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引请指定传输对象

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes. Specify the object (s) to transfer.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制数据存储过程引用完整性约束安全性索引

    You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制数据存储过程引用完整性约束安全性索引

    You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 约束有助于保持数据完整性规则

    Constraints are rules that help preserve the integrity of data in a table.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制数据存储过程引用完整性约束安全性索引

    Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制表、数据存储过程引用完整性约束安全性索引

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 该文提出一类数据系统所特有通道利用引用完整性约束传送信息的隐通道分析它们的带宽提出处理这类隐通道的方法

    This paper presents a class of specific covert channels in database system-the covert channel using referential integrity. We compute their bandwidth and propose the methods to handle them.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定