Books
in black and white
Main menu
Share a book About us Home
Books
Biology Business Chemistry Computers Culture Economics Fiction Games Guide History Management Mathematical Medicine Mental Fitnes Physics Psychology Scince Sport Technics
Ads

Introduction to the Teradata® RDBMS for UNIX® Version 2 Release 2.1 - NCR

NCR Introduction to the Teradata® RDBMS for UNIX® Version 2 Release 2.1 - NCR, 1998. - 315 p.
Download (direct link): inntroduktionteradata1998.pdf
Previous << 1 .. 68 69 70 71 72 73 < 74 > 75 .. 76 >> Next


restrictions 6-6 DROP INDEX statement 4-19 DROP MACRO statement 3-14, 8-5 DROP TABLE statement 4-19 Dual BYNETs 9-1, 9-9 Dynamic Data Exchange. See DDE

E

Embedded SQL 5-20 Encryption 11-7

ESCON channel connectivity 2-3, 2-4, 2-5, 2-11 Exclusion join described 5-13 EXECUTE statement 3-13, 8-5 EXPLAIN statement 8-6

F

Fallback tables 9-1, 9-3 FastExport utility 2-30 FastLoad utility 2-30 Fault tolerance 9-1 hardware 9-1, 9-9 software 9-1, 9-2 FETCH CURSOR 5-21 Fifth normal form. See Normal form, 5NF

File system 2-16, 2-25 First normal form

See Normal form, 1NF

Foreign key 3-3, 3-9 Fourth generation languages 2-22, 2-23

Fourth normal form. See Normal form, 4NF

Full functional dependence 3-3 Functional dependence 3-3

G

Gateway Control utility 12-21 gncApply 2-13, 2-14 GRANT LOGON statement 11-8 restrictions 11-9 Groups

defining 5-12 guidelines for selecting, 4-17

H

Hardware requirements

IBM channel-attached clients 13-4 network-attached clients 13-5 Hash Join 5-13 Hash value

processing 2-17 Host Utility. See HUT

I

Index 4-9

AMP usage 2-17 creating 4-18 creating primary 4-18 creating secondary 4-18 dropping 4-19 processing 2-17 INSERT statement 5-16

Introduction to the Teradata RDBMS for UNIX

Index-3
Index

populating tables 5-16 Lost update anomaly 10-6

ISO/OSI 2-11

J

Join 3-3

dependency 3-3 Join index 4-10 Joins

types of 5-13 Journaling 9-1, 9-6

down AMP recovery 9-6 permanent 9-6 transaction 10-1 transient 9-6

L

Lock manager 10-5 Locking Logger 2-39 Locks

concept 10-5 deadlocks 10-8 HUT 10-9

characteristics 10-9 types 10-9 levels 10-6

automatic 10-8 lost updates 10-6 types 10-7 access 10-7 exclusive 10-7 read 10-7 write 10-7 Why required? 10-6 Logical data independence 6-5 Logical operators 5-5 AND 5-5 NOT 5-5 OR 5-5 Logon policies 11-3

M

Macros 3-1, 3-13

application development 8-4 creating 3-13, 8-4 deleting 3-14, 8-5 executing 8-5 modifying 3-14, 8-5 SQL 3-13 using 3-13 Micro Operating System Interface. See MOSI Micro TDP. See MTDP Micro Teradata Director Program. See MTDP Monitoring 12-11 MOSI 2-27 functions 2-27 MultiLoad utility 2-30 Multivalued dependence 3-3

N

Names

fully qualified 5-8 Nesting subqueries 5-14 Nonunique Primary Index 4-14 Nonunique secondary index 4-17 Non-unique Secondary Index. See NUSI Normal form 3-6 1NF 3-6 2NF 3-6 3NF 3-7 4NF 3-8 5NF 3-8 BCNF 3-8 fifth 3-8

Index-4 Introduction to the Teradata RDBMS for UNIX
Index

first 3-6 fourth 3-8 PJ/NF 3-8 projection-join 3-8 second 3-6 third 3-7 Normalization 3-4 NUSI 4-11

O

ODBC 2-28, 2-29, 13-5 Open Database Connectivity. See ODBC Operators

partial string matching 5-5 relational algebra 5-2 Optimizing SQL

EXPLAIN statement 8-6

P

Parallel

step execution 2-16 Parent key 3-9 Parse tree 2-13 Parser

processing example 2-15 Passwords 11-5 Performance 2-25 improvements 13-2 scalability 2-25 Performance Monitor 2-39 Performance Monitor utility. See PM Performance Monitor/Application Programming Interface. See PM/API Physical access controlling 11-13 Plastic steps 2-14

PM 12-21 PM/API 12-20 Preprocessor2 2-28, 5-20 Primary index 4-10 attributes 4-13 creating 4-18

guidelines for selection 4-14 nonunique 4-14 unique 4-14 Primary key 3-2, 3-9

R

RACF 11-5 RAID 9-9

disk units 9-1, 9-9 RAID5 2-25 RCC views 7-5 RDBMS

concurrency control 10-1 RDBMS. See Teradata DBS Recovering data 9-7 Recovery 10-1 DBS 10-10 down AMP 10-11 single transaction 10-10 system and media 10-10 transaction 10-10 Recovery Control Catalog. See RCC Redundant Array of Inexpensive Disks - Level 5. See RAID5 Redundant Array of Inexpensive Disks. See RAID Referential integrity 3-1, 3-9 Relation 3-1 cardinality 3-1 degree 3-1 Relational algebra 3-2 Relational algebra operators DIVISION 5-2 INTERSECT 5-2 JOIN 5-2

Introduction to the Teradata RDBMS for UNIX

Index-5
Index

PRODUCT 5-2 PROJECT 5-2 SELECT 5-2 UNION 5-2 Relational Database Management System. See RDBMS REPLACE MACRO statement 3-14, 8-5

REPLACE VIEW statement 6-3 Request cache 2-13 dispatcher 2-8 handler 1-1 multiple 2-17 packaging 2-26 Resolver tree 2-13 Restarts

system 10-10 Results table order 5-12 REVOKE LOGON statement 11-8 ROLLBACK statement 9-7 ROLLFORWARD statement 9-7 Row 3-1

RowID join, described 5-13

S

Scalability 2-25, 13-2 Second normal form. See Normal form, 2NF

Secondary index 4-10, 4-15, 4-17 advantages of, 4-16 creating 4-18 journaling 4-15 subtables 4-15 Security

access 11-12 C2 11-7

identifying needs 11-13 policy 11-1, 11-12 TDP 11-5

tools 11-1 SELECT statement 5-2, 5-9 comparison operators 5-11 defining groups 5-12 GROUP BY clause 5-12 HAVING clause 5-12 JOIN operator 5-13 logical operators 5-11 nesting subqueries 5-14 ORDER BY clause 5-12 relational algebra operators 5-2 selecting all rows 5-9 selecting columns 5-9 selecting specific rows 5-10 specifying results order 5-12 WHERE clause 5-13 Self-join, described 5-13 Server
Previous << 1 .. 68 69 70 71 72 73 < 74 > 75 .. 76 >> Next