June 2018
Intermediate to advanced
478 pages
10h 52m
English
This chapter will prepare you for creating and using constraints to enforce business rules at the database layer. You will also learn how to use triggers and constraints to enforce data integrity rules. This chapter will introduce you to the key system catalog tables, which describe the physical and logical structure of the data stored in the database.
After the completion of this chapter, you will be able to demonstrate the ability to:
Read now
Unlock full access