Microsoft SQL Server 2005: Applied Techniques Step by Step (Pro-Step by Step Developer)

Index

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

IAM [See Index Allocation Map (IAM)]

ICF [See Instance Configuration File (ICF)]

IDE [See Integrated Development Environment (IDE)]

IIS [See Microsoft Internet Information Services (IIS)]

IMAGE

Image (.jpg or .bmp file)

Implicit transactions

Index Allocation Map (IAM)

Index Defragmentation

Index fragmentation

Index key 2nd

Index scan 2nd

Index seek 2nd

Indexes [See also specific types]

     list of types

     maintaining

     rebuilding

     reorganizing

     speed up join operations

Indexes on tables

     clustered indexes

     index key columns

     indexes on computed columns

     indexes on XML columns

     nonclustered indexes

     using covered indexes

Individual permissions, granting

Indivisible

INFORMATION_SCHEMA

INIT

Init procedure

Inline function

Inner join

INSERT clause

INSERT permissions

INSERT statement 2nd 3rd

Insert Store Procedure

Instance

     checking status of

     create

     editing configuration

     enabling

     managing

     registering

     remove login from

     starting

     updating and upgrading

Instance Configuration File (ICF) 2nd

Instance configuration information

Instance Properties dialog box

Int datatype

INTEGRATED

Integrated Development Environment (IDE)

Integration Services Project template

Intellisense

Intent (I) lock

Internet Explorer

Internet Protocol Security (IPSec)

IP address

     configuring SQL Server to listen on

     determine your computer's

     directing client application to correct, and executing queries

IPSec [See Internet Protocol Security (IPSec)]

IS_MEMBER system function

Isolation 2nd 3rd [See also Transaction isolation levelsTransaction isolation, managing]

IsolationLevel Enumerators namespace

IvUseFields

Категории