Hi All!
We are doing new development for SQL Server 2000 and also moving from
SQL 7.0 to SQL Server 2000.
What are cons and pros for using IDENTITY property as PK in SQL SERVER
2000?
Please, share your experience in using IDENTITY as PK .
Does SCOPE_IDENTITY makes life easier in SQL 2000?
Is there issues with DENTITY property when moving DB from one server
to another? (the same version of SQL Server)
Thank you in advance,
Andy
Jul 20 '05
112 10363
"Bob Badour" <bb*****@golden .net> wrote in message
news:ru******** ************@go lden.net... "BenignVani lla" <bv@tibetanbeef garden.com> wrote in message news:Qq******** ************@gi ganews.com... "Bob Badour" <bb*****@golden .net> wrote in message news:Qa******** ************@go lden.net... <snip> With all due respect, the user of the dbms does care. Think about it. Please explain. I do not understand your point.
That's because you have not thought about it yet. Either that or you
really do lack the ability to comprehend simple written english.
With each post, I believe you to be more of a troll. We are discussing a
specific topic here. You have taken issue with one of my questions. If you
will simply make insulting remarks and continue to refrain from answering
the questions with what you believe to be the correct answer, you do nothing
but reduce your credibility.
I understand the design I am discussing, and believe it to be a good one. If
you believe it not to be, explain why.
--
BV.
WebPorgmaster - www.IHeartMyPond.com
Work at Home, Save the Environment - www.amothersdream.com
"BenignVani lla" <bv@tibetanbeef garden.com> wrote in message
news:6f******** ************@gi ganews.com... "Bob Badour" <bb*****@golden .net> wrote in message news:DJ******** ************@go lden.net... "BenignVani lla" <bv@tibetanbeef garden.com> wrote in message news:p8******** ************@gi ganews.com... "Bob Badour" <bb*****@golden .net> wrote in message news:Iu******** ************@go lden.net... <snip> > > It is not a natural key. > > While the key remains unfamiliar, this is true. However, as soon as
it > becomes familiar, this ceases to be the case. I was assigned an arbitrary > nine digit university identification number two degades ago. I can still > recite this number easily having used it on literally hundreds if
not > thousands of pieces of correspondence. That sounds like a natural enough key > to me. <snip>
So, are you saying an arbritrary number assigned to you by your
collegis a natural key because it has become famaliar to you, but an IDENTITY
field can't be? I suggest you apparently lack the ability to comprehend relatively
simple written english as well. Could you point out anything I wrote that would lead you to conclude I ever said anything so ridiculous?
I did as you ask in my original post, where I quoted your post. It was my interpretation of that paragraph that led me to ask the question. I was
not making a statement, I was asking a question. You seemed to say, in the
above paragraph, that the number assigned to you by your college "sounds like a natural enough key", so I was inquiring as to why this arbitrary number is any more natural then an IDENTITY field.
I said nothing to indicate that it is any more natural than an identity
field. I suggest your incapacity with respect to written english amounts to
a failure to apply the closed world assumption.
"BenignVani lla" <bv@tibetanbeef garden.com> wrote in message
news:c5******** ************@gi ganews.com... "Bob Badour" <bb*****@golden .net> wrote in message news:ru******** ************@go lden.net... "BenignVani lla" <bv@tibetanbeef garden.com> wrote in message news:Qq******** ************@gi ganews.com... "Bob Badour" <bb*****@golden .net> wrote in message news:Qa******** ************@go lden.net... <snip> > With all due respect, the user of the dbms does care. Think about
it. Please explain. I do not understand your point. That's because you have not thought about it yet. Either that or you
really do lack the ability to comprehend simple written english.
With each post, I believe you to be more of a troll. We are discussing a specific topic here. You have taken issue with one of my questions. If you will simply make insulting remarks and continue to refrain from answering the questions with what you believe to be the correct answer, you do
nothing but reduce your credibility.
I understand the design I am discussing, and believe it to be a good one.
If you believe it not to be, explain why.
When the user of the dbms must track down an alleged anomaly in the data,
how does the user proceed?
"Bob Badour" <bb*****@golden .net> wrote in message
news:Dd******** ************@go lden.net...
<snip> Because most of the contributors to this thread are profoundly ignorant of fundamentals, they lack the ability to state anything succinctly, and instead they veer off onto wild tangents where they insist others accept their ignorant misconceived definitions of simple terms.
<snip>
I guess we'll have to agree to disagree, as I do not see your posts
contributing to the thread, and you don't see me doing that as well.
--
BV.
WebPorgmaster - www.IHeartMyPond.com
Work at Home, Save the Environment - www.amothersdream.com
"BenignVani lla" <bv@tibetanbeef garden.com> wrote in message
news:c5******** ************@gi ganews.com... That's because you have not thought about it yet. Either that or you really do lack the ability to comprehend simple written english.
With each post, I believe you to be more of a troll.
Let me free you of any doubts: if it looks like a troll, smells like a troll
and sounds like a troll: it's a troll!!!
And a boring one too because I hear nothing else but: "lack the ability to
comprehend simple written english.". And I can assure you, I comprehend
simple written English as well as Dutch, French and German :-P
"BenignVani lla" <bv@tibetanbeef garden.com> wrote in message
news:-P************** ******@giganews .com... "Bob Badour" <bb*****@golden .net> wrote in message news:Dd******** ************@go lden.net... <snip> Because most of the contributors to this thread are profoundly ignorant
of fundamentals, they lack the ability to state anything succinctly, and instead they veer off onto wild tangents where they insist others accept their ignorant misconceived definitions of simple terms. <snip>
I guess we'll have to agree to disagree, as I do not see your posts contributing to the thread, and you don't see me doing that as well.
I doubt we disagree on the data management issues, and I am quite content to
agree to disagree on the rest.
"Bob Badour" <bb*****@golden .net> wrote in message
news:vt******** ************@go lden.net...
<snip> When the user of the dbms must track down an alleged anomaly in the data, how does the user proceed?
That is a valid point. My answer would be that we have two levels of users.
The "app users" that never see the ID, would not be tracking such an
anomaly. So that is not an issue for us. If such an anomoly were to arise,
which hopefully the design and proper management would prevent, we have a
level of DB users that could analyze the tables directly to solve the issue
and hopefully provide a solution to prevent further anomolies.
--
BV.
WebPorgmaster - www.IHeartMyPond.com
Work at Home, Save the Environment - www.amothersdream.com
"BenignVani lla" <bv@tibetanbeef garden.com> wrote in message
news:Ft******** ************@gi ganews.com... "Bob Badour" <bb*****@golden .net> wrote in message news:vt******** ************@go lden.net... <snip> When the user of the dbms must track down an alleged anomaly in the
data, how does the user proceed? That is a valid point. My answer would be that we have two levels of
users. The "app users" that never see the ID, would not be tracking such an anomaly.
In other words, the "app users" use a view of the data with a different
identifier. They see the identifier they use. They might perceive an anomaly
in their data and use the identifier they see to track it down.
The relational model has views and snapshots, ie. named derived relation
variables, to address this very issue. It is revealing to consider the
candidate keys of these derived relation variables.
So that is not an issue for us. If such an anomoly were to arise, which hopefully the design and proper management would prevent
No amount of design and proper management can eliminate human error or
malice.
, we have a level of DB users that could analyze the tables directly to solve the
issue and hopefully provide a solution to prevent further anomolies.
These users see a different view of the data or perhaps a proper superset of
the "app users" view of the data. They, of course, can see the identifiers
they use.
"Bob Badour" <bb*****@golden .net> wrote in message
news:7q******** ************@go lden.net... "BenignVani lla" <bv@tibetanbeef garden.com> wrote in message news:Ft******** ************@gi ganews.com... "Bob Badour" <bb*****@golden .net> wrote in message news:vt******** ************@go lden.net... <snip> When the user of the dbms must track down an alleged anomaly in the data, how does the user proceed? That is a valid point. My answer would be that we have two levels of users. The "app users" that never see the ID, would not be tracking such an anomaly.
In other words, the "app users" use a view of the data with a different identifier. They see the identifier they use. They might perceive an
anomaly in their data and use the identifier they see to track it down.
True.
The relational model has views and snapshots, ie. named derived relation variables, to address this very issue. It is revealing to consider the candidate keys of these derived relation variables.
So that is not an issue for us. If such an anomoly were to arise, which hopefully the design and proper management would prevent No amount of design and proper management can eliminate human error or malice.
True, which is why I like the IDENTITY fields in this case. By allowing the
DB to assign a unique key to the records in this particular table, I reduce
the human error component by one by not relying on a user to properly link
this record to others, or improperly break that link with a typo. , we have a level of DB users that could analyze the tables directly to solve the issue and hopefully provide a solution to prevent further anomolies.
These users see a different view of the data or perhaps a proper superset
of the "app users" view of the data. They, of course, can see the identifiers they use.
True.
--
BV.
WebPorgmaster - www.IHeartMyPond.com
Work at Home, Save the Environment - www.amothersdream.com
"BenignVani lla" <bv@tibetanbeef garden.com> wrote in message
news:Wf******** ************@gi ganews.com... "Bob Badour" <bb*****@golden .net> wrote in message news:7q******** ************@go lden.net... "BenignVani lla" <bv@tibetanbeef garden.com> wrote in message news:Ft******** ************@gi ganews.com... "Bob Badour" <bb*****@golden .net> wrote in message news:vt******** ************@go lden.net... <snip> > When the user of the dbms must track down an alleged anomaly in the data, > how does the user proceed?
That is a valid point. My answer would be that we have two levels of users. The "app users" that never see the ID, would not be tracking such an anomaly.
In other words, the "app users" use a view of the data with a different identifier. They see the identifier they use. They might perceive an
anomaly in their data and use the identifier they see to track it down.
True.
The relational model has views and snapshots, ie. named derived relation variables, to address this very issue. It is revealing to consider the candidate keys of these derived relation variables.
So that is not an issue for us. If such an anomoly were to arise, which hopefully the design and proper management would prevent
No amount of design and proper management can eliminate human error or malice.
True, which is why I like the IDENTITY fields in this case. By allowing
the DB to assign a unique key to the records in this particular table, I
reduce the human error component by one by not relying on a user to properly link this record to others, or improperly break that link with a typo.
I direct you back to my earlier suggestion to consider the candidate keys of
the named derived relation variables the "app users" see. From the
perspective of the "app users", you have not affected anything with respect
to forming proper references or identifiers, and you have introduced an
opportunity for human error on the part of the direct dbms users or
application programmers.
Note, I am not saying that one should never use an identity column or
introduce a simple surrogate; I am only trying to get you to recognize the
real consequences of the decision. Those consequences actually contradict
your statement above. , we have a level of DB users that could analyze the tables directly to solve the issue and hopefully provide a solution to prevent further anomolies.
These users see a different view of the data or perhaps a proper
superset of the "app users" view of the data. They, of course, can see the
identifiers they use.
True. This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Phil W |
last post by:
Hi all,
Am having a bit of trouble with the @@identity field - I probably just have
that friday feeling and am missing off something obvious, but the below code
brings back am empty identity value ("sid" appears empty). I've definitely
set up an identity field in the tblSurvey:
set rsAdd = Server.CreateObject("ADODB.Recordset")
rsAdd.open "tblSurvey", conn, 3 , 3
rsAdd.AddNew
|
by: Mark |
last post by:
Hi,
How to add a foreign key constraint using the SQL server 2000
enterprise manager?
Not by SQL.
thanks
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
| |
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |