Locking & Data Protection

Teradata 14    |    Beginner
  • 11 videos | 57m 53s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
To control concurrency, Teradata uses different locking mechanisms. Discover the different locking mechanisms and performance availability features, such as RAID, failover, cliques, and hot standby.

WHAT YOU WILL LEARN

  • Describe how teradata uses locking and the different types of locks
    Identifying the locking conderations in a teradata database
    Describe how the two-phase locking and serializability works in teradata
    Use the locking request modifier in a teradata sql read operation
    Describe a deadlock and how they are handled in a teradata database
    Describe how perm, spool, and temp are used to manage space for a user
  • Estimate space requirements in teradata
    Describe how fallback and journaling are used for data protection in teradata
    Describe how cliques, hot standby, and raid are used for data protection in teradata
    Describe how raid is used for data protection in teradata
    Create the different types of indexes for a teradata database, use locking, and describe performance availability features

IN THIS COURSE

  • 4m 57s
    Upon completion of this video, you will be able to describe how Teradata uses locking and the different types of locks. FREE ACCESS
  • 5m 22s
    In this video, find out how to identify the locking conditions in a Teradata database. FREE ACCESS
  • Locked
    3.  Two-Phasing Locking and Serializability
    6m 12s
    Upon completion of this video, you will be able to describe how two-phase locking and serializability work in Teradata. FREE ACCESS
  • Locked
    4.  Using the LOCKING Request Modifier
    5m 10s
    In this video, find out how to use the LOCKING request modifier in a Teradata SQL read operation. FREE ACCESS
  • Locked
    5.  Understanding Deadlocks
    5m 1s
    Upon completion of this video, you will be able to describe a deadlock and how to handle them in a Teradata database. FREE ACCESS
  • Locked
    6.  Managing Space
    7m 18s
    Upon completion of this video, you will be able to describe how perm, spool, and TEMP are used to manage space for a user. FREE ACCESS
  • Locked
    7.  Estimating Space Requirements
    4m 28s
    During this video, you will learn how to estimate space requirements for Teradata. FREE ACCESS
  • Locked
    8.  Overview of Fallback and Journals
    4m 41s
    After completing this video, you will be able to describe how fallback and journaling are used for data protection in Teradata. FREE ACCESS
  • Locked
    9.  Overview of Cliques and Hot Standby Nodes
    3m 5s
    Upon completion of this video, you will be able to describe how cliques, hot standby, and RAID are used for data protection in Teradata. FREE ACCESS
  • Locked
    10.  Overview RAID
    6m 31s
    After completing this video, you will be able to describe how Teradata uses RAID for data protection. FREE ACCESS
  • Locked
    11.  Exercise: Create Indexes and Use locking
    5m 9s
    In this video, you will learn how to create different types of indexes for a Teradata database, use locking, and describe performance availability features. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)