Escolar Documentos
Profissional Documentos
Cultura Documentos
-------------------------------------Datatype
1.Bigint
2.Int
3.Smallint
4.Tinyint
5.Bit
Min
Max
-9.22337E+18 2^63-1
-2,147,483,648
2,147,483,647
-32,768
32,767
0
255
8
4
2
1
Storage
bytes
bytes
bytes
bytes
1 to 8 bit
columns in the
same table
requires a
total of 1 byte,
9 to 16 bits =
1 2 bytes, etc...
6.Decimal
7.Numeric
8.Money
9.Smallmone
y
Float
Real
Datetime
Smalldateti
me
Date
1E+38 10^381
same as
Decimal
same as Decimal
-9.22337E+14 2^63-1 / 10000
-214,748.36
Precision 1-9 =
5 bytes,
precision 1019 = 9 bytes,
precision 2028 = 13 bytes,
precision 2938 = 17 bytes
same as
Decimal
8 bytes
214,748.36 4 bytes
-1.79E + 308
-3.40E + 38
1.79E + 308
3.40E + 38
4 bytes when
precision is
less than 25
and 8 bytes
when precision
is 25 through
53
4 bytes
1753-01-01
00:00:00.000
###########
########
8 bytes
1/1/1900 0:00
0001-01-01
6/6/2079 23:59
12/31/9999 3 bytes
Time
Datetime2
00:00.0
0001-01-01
00:00:00.0000
000
00:00.0
###########
########
Presicion 1-2 =
6 bytes
precision 3-4
= 7 bytes
precision 5-7
= 8 bytes
Datetimeoffs
et
0001-01-01
00:00:00.0000
000 -14:00
9999-12-31
23:59:59.9999999
+14:00
Presicion 1-2 =
8 bytes
precision 3-4
= 9 bytes
precision 5-7
= 10 bytes
Char
0 chars
8000 chars
Defined width
8000 chars
2 bytes +
number of
chars
2^31 chars
2 bytes +
number of
chars
4 bytes +
number of
chars
Varchar
Varchar(max
)
0 chars
0 chars
Text
0 chars
2,147,483,647
chars
Nchar
Nvarchar
Nvarchar(ma
x)
0 chars
0 chars
4000 chars
4000 chars
0 chars
Ntext
Binary
Varbinary
0 chars
0 bytes
0 bytes
2^30 chars
1,073,741,823
chars
8000 bytes
8000 bytes
Varbinary(m
ax)
0 bytes
Image
Sql_variant
Timestamp
Uniqueidenti
fier
Xml
Cursor
Table
0 bytes
2^31 bytes
2,147,483,647
bytes
Defined width
x2
Constraints
Entity Integrity
Domain Integrity
Referential integrity
User-Defined Integrity
PRIMARY KEY
UNIQUE
FOREIGN KEY
CHECK
NOT NULL
A PRIMARY KEY constraint is a unique identifier for a row within a database table. Every
table should have a primary key constraint to uniquely identify each row and only one
primary key constraint can be created for each table. The primary key constraints are used
to enforce entity integrity.
A UNIQUE constraint enforces the uniqueness of the values in a set of columns, so no
duplicate values are entered. The unique key constraints are used to enforce entity integrity
as the primary key constraints.
A FOREIGN KEY constraint prevents any actions that would destroy link between tables
with the corresponding data values. A foreign key in one table points to a primary key in
another table. Foreign keys prevent actions that would leave rows with foreign key values
when there are no primary keys with that value. The foreign key constraints are used to
enforce referential integrity.
A CHECK constraint is used to limit the values that can be placed in a column. The check
constraints are used to enforce domain integrity.
A NOT NULL constraint enforces that the column will not accept null values. The not null
constraints are used to enforce domain integrity, as the check constraints.
What is SDLC?
SDLC is a process followed for a software project, within a software organization. It consists of
a detailed plan describing how to develop, maintain, replace and alter or enhance specific
software. The life cycle defines a methodology for improving the quality of software and the
overall development process.
The following figure is a graphical representation of the various stages of a typical SDLC.
SDLC Models
There are various software development life cycle models defined and designed which are
followed during software development process. These models are also referred as "Software
Development Process Models". Each process model follows a Series of steps unique to its type,
in order to ensure success in process of software development.
Following are the most important and popular SDLC models followed in the industry:
Waterfall Model
Iterative Model
Spiral Model
V-Model
The other related methodologies are Agile Model, RAD Model, Rapid Application Development
and Prototyping Models.
Company hierarchy