|
This course explains the use of constraints in databases. The user will learn about primary and foreign keys, and unique and check constraints. The user will also learn about the use of indexes and triggers within databases. Finally, the user will receive an overview of the tools used to manage database security.
Objectives:
- Explain the use of database constraints
- Define primary and foreign keys
- Describe the use of unique and check constraints
- Explain the function of database indexes
- Describe the function of triggers
- Identify the tools used in database security
Topics:
- Understanding constraints
- Primary and foreign keys
- Unique and check constraints
- Understanding indexes
- Understanding triggers
- Database security
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|