In SQL Server, this is equal to shared locks.
Process of copying data and database objects from one data source to another across a network. This is done to synchronize two databases or to maintain a remote copy of a database.
A database object that can be applied to columns or alias data types to enforce domain integrity. Is deprecated and should not be used.
Used to indicate that an application can handle an increased workload to accommodate a growing number of users. Scalability is accomplished by either scaling up (by increasing the hardware capacity of the current server) or scaling out, (by increasing the number of servers).
User-defined function in which a single data value is returned, such as a string or an integer.
A table-level lock taken to assert that a table's schema cannot be changed while the lock is held.
Refers to the WHERE portion of a SELECT query in which a column is compared to a variable or a constant value. The query optimizer uses the searchable argument to determine the optimal execution path.
To secure communications across the network, SSL certificates can be registered for a socket, which is an IP address and port.
Designed by the World Wide Web Consortium (W3C), this transport protocol provides a standard way to send messages between applications using XML.
This new protocol available with SQL Server 2005 allows you to cluster together multiple servers to provide high availability to your database applications.
User-defined function in which a table is returned as a result, as opposed to a single data value.
If an error occurs while within a try block, the execution control is transferred to the catch block adjacent to the try block.
A database object that enforces value uniqueness for one or more columns in a table. Used to enforce entity integrity.