Dropping a column requires table reorganization before further table access is allowed.
删除列之后要求进行表重组,然后才允许进行进一步的表访问。
Performance can be improved by allowing the predicate to be applied close to the table access.
通过允许将谓词应用到表访问,可以提高性能。
Relational query multi table ACCESS database routines, a good reference, there is a need to download it.
说明:ACCESS数据库多表关联查询例程,很好的参考资料,有需要的就下载吧。
With this heuristic, predicates are applied as soon as possible (as close to table access as possible) in the query.
通过这种试探法,可以尽快(尽可能接近表访问)地在查询中应用谓词。
Altering this attribute for a column requires table reorganization before further table access is allowed (SQLSTATE 57016).
修改列的这个属性要求进行表重组,然后才允许进行进一步的表访问(SQLSTATE 57016)。
Finally, you can override the default update behavior when the database requires table access through stored procedures.
最后,在资料库需要透过预存程序进行资料表存取时,也可以覆写预设更新行为。
An index only scan is an index access that is not followed by a table access because the index itself contains all the requested data.
仅扫描索引是未包含表访问的索引访问,因为索引本身包含了所有被请求的数据。
As was mentioned in the previous article, for single table access, there are two types of access methods: table space scan (TBSCAN) and index scan (IXSCAN).
在第1部分中提到过,有两种类型访问方法:表空间扫描(TBSCAN)和索引扫描(IXSCAN)。
This locking was done for both index scans and table access whether or not the row of data was committed or whether it would have been excluded based on the statement's predicates.
不管数据行是否被提交,以及根据语句的谓词它是否被排除,对于索引扫描和表访问都执行这样的锁定操作。
If there are additional filters that need to be applied to the data after the table access step, the rows will pass through that filter before being included in the final result set from that step.
如果有附加的过滤器需要在表访问步骤之后应用于数据,在被包括在,自那步起的最终结果集之前,行集将穿过过滤器。
You may experience deadlocks from a database if both methods try to access to the same table.
如果两个方法都试图访问同一张表,您就可能遇到来自数据库的死锁。
There is no FETCH or table node shown in the access path graph because it is an index-only scan.
因为其是一个唯一索引扫描,所以在访问路径图中不显示FETCH或表节点。
Therefore, if all access to a table is static, you would only need to grant access to the package, not the entire table or view.
因此,如果对一个表的所有访问都是静态的,您仅需要授权给程序包,而非整个表和视图。
You can obtain the statistics from the table descriptor of the table node in the underlying access path graph.
您可以从基础访问路径图中的表节点的表描述符处获得该统计信息。
You ran RUNSTATS with distribution and indexes all option, allowing write access to the table.
您运行带有分布和索引所有选项的RUNSTATS,从而允许对表进行写访问。
Another popular method of controlling access to table data is through the use of stored procedures.
控制对表数据的访问的另一种流行方法是使用存储过程。
Listing 2 shows a simple database access class for the book table.
清单2显示了图书表的简单的数据库访问类。
Focus on optimizing access to one table at a time.
一次重点优化对一个表的访问。
Now, as shown in Listing 20, when users reconnect to the database and try to access the table, they receive an error.
现在,如清单20所示,当用户重新连接到数据库,并试图访问表时,将接收到错误消息。
One option for further consideration would tracking modifications using database triggers, and having the interceptor access the table the triggers write to.
一个可选的更深的考虑是使用数据库触发器来跟踪变化,让拦截器访问触发器所写入的表。
Support of external table creation, access, load, and unload from within the stored procedures makes it easier to perform the batch load and unload operations.
存储过程中的外部表创建、访问、加载和卸载支持允许您更轻松地执行批加载和卸载操作。
This will allow both of the following queries to use indexed access rather than table scans.
这将允许下面两个查询来使用索引访问,而不是表扫描。
In other words, if all access to a table is static, the DBA would not need to grant access to the entire table or view, just to the package.
换句话说,如果对某个表的所有访问都是静态的,则DBA将不需要授予对整个表或视图的访问权限,而是仅授予对包的访问权限。
To see the table descriptor, right-click the table node in the access path graph.
为了查看表描述符,请右键单击访问路径图上的表节点。
The output confirms that SAM tried to access a table he was not supposed to.
这个输出可以证实SAM 曾经尝试访问他无权访问的一个表。
This guideline specifies that a single XML index scan be used to access the given table.
该准则指定一个单一的xml索引扫描,将用于访问给定的表。
To ensure that the script can't be used to access any table in the database, the code first checks the table name requested.
为确保这个脚本不能用于访问数据库中的任何表,代码首先检查被请求的表名。
This single value is a locator to the transition table, which the procedure USES to access the transition table columns.
这个单值是转换表的定位器,存储过程用它来访问转换表的列。
The example guideline in Listing 16 specifies that some XML index be used to access the table SECURITY.
清单16中的示例准则指定必须使用一些XML索引来访问表SECURITY。
DB2 and IDS USES the statistics information in the catalog table to derive the best access plan.
DB2和IDS使用目录表中的统计信息来制定最佳访问计划。
应用推荐