Data Integrity & Constraints

SQL Server 2016    |    Intermediate
  • 11 videos | 1h 13m 16s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 168 users Rating 4.3 of 168 users (168)
Constraints can be used in SQL Server 2016 to ensure data integrity. Discover how to design and implement constraints for tables and columns.

WHAT YOU WILL LEARN

  • Recognize the three basic forms of data integrity: domain, entity, referential
    Use the various mechanisms used to enforce data integrity
    Describe entity and referential integrity
    Describe the use of the primary key constraint
    Use the foreign key constraint
    Describe the unique constraint i
  • Describe the identity constraint
    Recognize the common considerations to be aware of when working with constraints
    Demonstrate how to write transact-sql statements to add constraints to tables
    Demonstrate how to identify results of dml statements given exiting tables and constraints
    Describe stored procedures and their benefits

IN THIS COURSE

  • 7m 54s
    After completing this video, you will be able to recognize the three basic forms of data integrity: domain, entity, and referential. FREE ACCESS
  • 9m 15s
    In this video, find out how to use the various mechanisms used to enforce data integrity. FREE ACCESS
  • Locked
    3.  Entity and Referential Integrity
    7m 5s
    Upon completion of this video, you will be able to describe entity integrity and referential integrity. FREE ACCESS
  • Locked
    4.  PRIMARY KEY Constraints
    7m
    Upon completion of this video, you will be able to describe the use of the PRIMARY KEY constraint. FREE ACCESS
  • Locked
    5.  FOREIGN KEY Constraints
    7m 32s
    During this video, you will learn how to use the FOREIGN KEY constraint. FREE ACCESS
  • Locked
    6.  UNIQUE Constraints
    3m 35s
    Upon completion of this video, you will be able to describe the UNIQUE constraint. FREE ACCESS
  • Locked
    7.  IDENTITY Constraints
    6m 30s
    Upon completion of this video, you will be able to describe the IDENTITY constraint. FREE ACCESS
  • Locked
    8.  Constraint Checking
    4m 12s
    Upon completion of this video, you will be able to recognize common considerations to be aware of when working with constraints. FREE ACCESS
  • Locked
    9.  Adding Constraints to Tables
    8m 51s
    In this video, you will learn how to write Transact-SQL statements to add constraints to tables. FREE ACCESS
  • Locked
    10.  Identifying Results Given Existing Constraints
    5m 34s
    In this video, you will learn how to identify results of DML statements given existing tables and constraints. FREE ACCESS
  • Locked
    11.  Exercise: Configure Constraints
    5m 48s
    Upon completion of this video, you will be able to describe stored procedures and their benefits. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 208 users Rating 4.6 of 208 users (208)
Course Encryption
Rating 4.5 of 104 users Rating 4.5 of 104 users (104)
Rating 4.6 of 51 users Rating 4.6 of 51 users (51)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 100 users Rating 4.6 of 100 users (100)
Rating 4.5 of 473 users Rating 4.5 of 473 users (473)
Course Functions
Rating 4.5 of 43 users Rating 4.5 of 43 users (43)