Kurs 73481 - Microsoft SQL Server 2000 Designing and Implementing Databases - Part 2: Managing Data
Ziele- Identify the SQL Server 2000 system-supplied data types. - Add a user defined data type. - Match the parts of a data row with their features. - Identify characteristics of entity modeling. - Identify features of attributes. - Identify requirements for logical modeling. - Identify the login authentication modes and methods used by SQL Server 2000. - Identify the functions of database user accounts and roles in SQL Server 2000. - Match the types of roles in SQL Server 2000 with their characteristics.
AnforderungenThe intended Audience for this course includes database designers, database managers, and technical managers. Candidates for Exam 70-229 operate in medium to large computing environments that use SQL Server 2000, Windows 2000 Active Directory, and Internet Information Server (IIS). Students are expected to have experience with using the Microsoft Windows 2000 operating system, understand database concepts and Transact-SQL syntax. Students should be familiar with the role of the database administrator. In addition, students should have taken part one of this series (73480).
TitelKurs 73481 - Microsoft SQL Server 2000 Designing and Implementing Databases - Part 2: Managing Data
InhaltCourse Overview
This is the second course in a five part series that will teach students how to work with SQL Server data.
Deployment Options
Self-Study
Accreditation
CEU credits: 0.70 CEUs
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Data Types and Tables 3 hours
- Add a user defined data type.
- Match the parts of a data row with their features.
- Identify how SQL Server 2000 organizes the exceptions to row organization.
- Identify the considerations of table creation.
- Create a table by using SQL Server Enterprise Manager.
- Create a user-defined data type.
- Add a column to a table.
- Generate a value for a column automatically by using the Identity property.
- Identify the features of the uniqueidentifier data type used with the NEWID function.
Unit 2: Implementing Data Integrity 1 - 2 hours
- Identify characteristics of entity modeling.
- Identify features of attributes.
- Identify requirements for logical modeling.
- Identify the characteristics of data normalization.
- Identify rules for data normalization.
- Match the data integrity types with their functions.
- Identify the methods of enforcing data integrity.
- Match the constraints required to enforce each data integrity type with their functions.
- Identify guidelines for creating constraints.
- Identify the considerations for applying constraints.
- Identify the considerations for applying DEFAULT constraints.
- Identify the considerations for applying CHECK constraints.
- Identify the considerations for applying PRIMARY KEY constraints.
- Identify the considerations for applying UNIQUE constraints.
- Identify the considerations for applying FOREIGN KEY constraints.
- Define a PRIMARY KEY constraint.
- Define a FOREIGN KEY constraint.
- Identify characteristics of the options for cascading referential integrity.
- Identify guidelines for disabling constraints for existing data.
- Identify guidelines for disabling constraint checking when loading new data.
- Create a default by using Transact-SQL.
- Create a rule by using Transact-SQL.
Unit 3: Security 2 - 3 hours
- Identify the login authentication modes and methods used by SQL Server 2000.
- Identify the functions of database user accounts and roles in SQL Server 2000.
- Match the types of roles in SQL Server 2000 with their characteristics.
- Sequence the steps in the process for validating permissions in SQL Server 2000.
- Identify types of permissions.
- Identify guidelines for managing permissions.
- Identify the methods for revoking granted and denied permissions.
- Assign statement permissions by using SQL Server Enterprise Manager.
- Assign object permissions by using SQL Server Enterprise Manager.
- Identify the considerations for planning security within SQL Server 2000.
- Identify the guidelines for managing security with views and stored procedures.
- Implement permissions by using views and stored procedures.
- Identify the features of application roles in managing client application security.
- Create an application role.
- Activate an application role.
Course Access
Each student has access to the course for a period of 6 months from the day of enrollment in the course.
Ähnliche angebote die in bezug zu ihrer anfrage "microsoft" stehen