[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] T-SQL 2nd ANSI SQL and 2nd 3rd 4th 5th 6th 7th backup devices 2nd 3rd 4th 5th 6th columns defining 2nd identity 2nd properties 2nd 3rd 4th constraints creating 2nd 3rd 4th CREATE_INDEX command 2nd 3rd cursors 2nd 3rd 4th 5th 6th 7th API 2nd 3rd 4th 5th 6th closing deallocating 2nd declaring 2nd 3rd 4th 5th 6th DYNAMIC 2nd fetching rows 2nd FORWARD ONLY information about 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th INSENSITIVE 2nd KEYSET 2nd local/global 2nd main loop 2nd opening 2nd rows, modifying 2nd scrollable cursors 2nd 3rd STATIC 2nd variables 2nd 3rd 4th 5th 6th 7th variables, declaring 2nd when to use 2nd 3rd 4th 5th 6th database creation 2nd 3rd database roles 2nd databases backups 2nd 3rd 4th 5th 6th restoring 2nd 3rd 4th 5th datatypes bigint 2nd sql_variant 2nd 3rd 4th 5th 6th 7th 8th 9th 10th table 2nd 3rd DELETE statement 2nd fixed-database roles 2nd function creation 2nd 3rd 4th 5th 6th 7th 8th 9th functions modifying 2nd 3rd viewing 2nd 3rd 4th 5th 6th 7th indexed views 2nd indexes 2nd 3rd INSERT statement 2nd 3rd 4th legacy linked servers and 2nd 3rd 4th 5th login management 2nd 3rd 4th object permissions 2nd options setting 2nd permissions 2nd print statement 2nd restores 2nd 3rd returning messages 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th SET command 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th CONTEXT INFO setting 2nd 3rd 4th session options 2nd 3rd 4th 5th 6th 7th subqueries 2nd 3rd 4th 5th 6th aggregates as derived tables 2nd joins and 2nd 3rd not exists 2nd not in 2nd table creation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th tables location 2nd transaction log backups 2nd transaction logs restores 2nd 3rd UPDATE statement 2nd 3rd user management 2nd user-defined functions 2nd Visual Basic debugger T-SQL Debugger 2nd 3rd Query Analyzer common problems 2nd 3rd 4th 5th 6th Query Analyzer and 2nd 3rd 4th 5th 6th 7th 8th 9th 10th table creation Table Designer 2nd 3rd 4th table datatype stored procedures 2nd 3rd 4th 5th 6th 7th table datatype, T-SQL 2nd 3rd Table Delete operator, Query Analyzer Table Designer columns index creation scripts for table creation 2nd table creation 2nd 3rd 4th Table Designer, Enterprise Manager constraints Table Insert operator, Query Analyzer Table Properties dialog box Table Scan operator, Query Analyzer table scans 2nd table scans on heaps, read aheads 2nd Table Spool icon, Query Analyzer Table Update operator, Query Analyzer table variables transactions and table-level constraints table-valued functions 2nd 3rd 4th 5th 6th inline 2nd multistatement 2nd 3rd 4th system-wide 2nd 3rd 4th tables aliasing attributes caching clustered tables 2nd columns BCP utility 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th datatypes, changing 2nd 3rd dropping 2nd 3rd size limits T-SQL 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th constraints T-SQL 2nd 3rd creating T-SQL 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th datatypes dropping adding 2nd 3rd Enterprise Manager 2nd entities examples 2nd full table scan heap tables 2nd 3rd indexes separating joining 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th location T-SQL 2nd locking and 2nd 3rd 4th 5th 6th 7th 8th 9th member tables names 2nd 3rd naming 2nd 3rd 4th renaming 2nd overview 2nd 3rd parallel loading, BCP utility 2nd 3rd 4th 5th 6th performance monitoring pinning row offset table 2nd 3rd 4th rows adding 2nd 3rd 4th deleting 2nd entity integrity size limits size limitations 2nd statistics Query Analyzer stored procedures 2nd sysdatabases sysfiles syslockinfo 2nd 3rd 4th syslockinfo table 2nd 3rd 4th 5th 6th 7th system tables 2nd 3rd 4th 5th 6th 7th 8th temporary 2nd temporary tables stored procedures 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th traces, saving tags XML 2nd tape backup devices 2nd tape backups compared to disk backups 2nd 3rd target servers 2nd Task Manager Windows 98 and Windows Me Taskpad 2nd 3rd TCP/IP connection troubleshooting 2nd 3rd 4th 5th 6th distributors use publishers use TCP/IP Sockets tempdb database templates scripts Query Analyzer 2nd 3rd 4th trace templates 2nd 3rd traces XML 2nd 3rd 4th 5th 6th temporary tables 2nd temporary tables, stored procedures 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th performance 2nd 3rd 4th 5th 6th 7th 8th test environment 2nd 3rd 4th 5th 6th 7th testing e-mail client 2nd text data pages 2nd 3rd 4th 5th 6th 7th data rows 2nd 3rd row data 2nd searches enhancements 2nd stored procedures viewing text and image functions 2nd text datatype text searches limiting hits thread pool thread pooling, MTS and threads server threads 2nd 3rd 4th 5th worker threads 2nd 3rd 4th three tier applications tiers client/server n-tier client/server three-tier client/server two-tier client/server 2nd timeouts locks 2nd timestamp datatype optimistic locking and 2nd 3rd 4th 5th 6th tools client installation 2nd 3rd 4th 5th 6th Tools menu Enterprise Manager 2nd ToolTips execution plans, Query Analyzer 2nd 3rd 4th 5th 6th 7th 8th TOP keyword SELECT statement 2nd 3rd 4th WITH TIES option Top operator, Query Analyzer top-down warehouses 2nd 3rd Trace Profiler and trace flag 1200, deadlocks and 2nd 3rd 4th 5th trace flag 1204, deadlocks and 2nd 3rd trace flag 1205, deadlocks and 2nd 3rd 4th trace flags DBCC traces data columns 2nd 3rd 4th 5th events 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th exporting 2nd 3rd 4th 5th importing 2nd 3rd 4th 5th 6th 7th 8th Index Tuning Wizard Index Tuning Wizard and locking and 2nd 3rd names Profiler 2nd 3rd properties 2nd 3rd 4th replaying 2nd 3rd running, monitoring 2nd 3rd saving 2nd 3rd 4th to tables server side 2nd 3rd server side, stopping 2nd 3rd stop time templates 2nd 3rd 4th traffic, network stored procedures and trait phrasing , English Query Transact -SQL. [See T-SQL] transaction log backups 2nd 3rd 4th 5th 6th 7th Enterprise Manager 2nd 3rd T-SQL 2nd data rows log reader agent transaction log backups transaction logs backups 2nd files 2nd 3rd performance monitoring T-SQL restores 2nd 3rd Transaction Server 2nd transactional replication 2nd 3rd 4th 5th 6th distribution agent updating subscribers and transactions [See also distributed transactions] ACID properties AutoCommit 2nd 3rd 4th batches and 2nd 3rd 4th 5th 6th bound connections 2nd 3rd 4th 5th 6th 7th 8th coding effective 2nd defining 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd distributed 2nd 3rd expanding duties explicit user-defined 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th immediate transactional consistency implicit 2nd 3rd 4th 5th 6th isolation levels 2nd 3rd 4th 5th 6th 7th 8th 9th 10th locking and 2nd 3rd 4th 5th latent transactional consistency locks exclusive 2nd 3rd 4th 5th shared 2nd 3rd 4th 5th log reader agent logging 2nd 3rd 4th checkpoints 2nd 3rd 4th 5th 6th 7th 8th long-running 2nd 3rd 4th 5th 6th management overview 2nd modes, MTS 2nd naming nested 2nd 3rd 4th 5th 6th 7th 8th non-repeatable reads overview 2nd 3rd partial phantom data recovery 2nd 3rd 4th 5th 6th 7th 8th 9th savepoints 2nd 3rd triggers 2nd 3rd 4th stored procedures calling 2nd 3rd 4th 5th stored procedures and 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th table variables and triggers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th savepoints 2nd 3rd 4th Transform Data task, DTS data pump and transformations DTS Designer trend analysis, OLAP Trigger Properties window triggers AFTER 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th AFTER trigger 2nd 3rd 4th 5th cascading deletes 2nd 3rd 4th 5th cascading updates 2nd 3rd 4th 5th column updates and 2nd 3rd 4th 5th creating 2nd 3rd 4th 5th debugging deleted tables and 2nd 3rd 4th 5th 6th firing order 2nd 3rd inserted tables 2nd 3rd 4th 5th 6th INSTEAD OF 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd restrictions 2nd views 2nd 3rd 4th 5th 6th 7th 8th names 2nd nested 2nd 3rd configuration overview 2nd 3rd 4th recursive 2nd 3rd referential integrity 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th triggers, transactions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th savepoints 2nd 3rd 4th troubleshooting client connections 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th installation 2nd MSCS 2nd MTS 2nd 3rd 4th named pipes 2nd 3rd 4th ODBC connections 2nd 3rd replication failures 2nd 3rd 4th TRUNCATE ONLY option TRUNCATE ONLY option, BACKUP LOG command 2nd TRUNCATE TABLE statement trusted connections tuples, Analysis Services two-phase commit protocol distributed transactions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th distributed transactions and two-tier models 2nd Typical installation |