• Online, Self-Paced
Course Description

Constraints can be used in SQL Server 2016 to ensure data integrity. This covers how to design and implement constraints for tables and columns. This course also covers stored procedures, a SQL Server feature that allows you to reuse the code over and over, providing advantages such as performance, productivity, and ease of use. This course is one of a series of courses that cover the objectives for 70-762: Developing SQL Databases exam.

Learning Objectives

Data Integrity

  • start the course
  • recognize the three basic forms of data integrity: domain, entity, referential
  • use the various mechanisms used to enforce data integrity
  • describe entity and referential integrity

Constraints

  • describe the use of the PRIMARY Key constraint
  • use the FOREIGN KEY constraint
  • describe the UNIQUE constraint I
  • describe the IDENTITY constraint
  • recognize the common considerations to be aware of when working with constraints
  • demonstrate how to write Transact-SQL statements to add constraints to tables
  • demonstrate how to identify results of DML statements given exiting tables and constraints

Stored Procedures

  • describe stored procedures and their benefits
  • design stored procedures components and structure based on business requirements
  • describe how to use the input and output parameters
  • demonstrate how to use table-valued parameters
  • implement return codes
  • streamline existing stored procedure logic
  • implement error handling and transaction control logic within stored procedures
  • alter a stored procedure using the Transact-SQL ALTER PROCEDURE statement
  • obfuscate stored procedures using the WITH ENCRYPTIONS clause

Practice: Implementing Constraints

  • configure constraints in SQL Server 2016

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.