Index

I

I/O : estimates Providing estimates to improve query performance
I/O : idle How the database decides when to checkpoint
IBM : protocol stacks Common protocol stacks
IBM DB2 : remote data access Server class db2odbc
icons : for running services Setting the account options
icons : used in manuals Graphic icons
identifiers : case insensitivity International aspects of case sensitivity
identifiers : case sensitivity Case-sensitivity
identifiers : definition of Entities
identifiers : international aspects International aspects of case sensitivity
identifiers : qualifying Entering queries
identifiers : uniqueness Ensuring compatible object names
IDENTITY column The special IDENTITY column
identity column : retrieving values Retrieving IDENTITY Column Values with @@identity
idle I/O : task How the database decides when to checkpoint
IF statement : syntax Control statements
implementation of locking How Adaptive Server Anywhere implements locking
import statement : Java A Java glossary
Use of import statements
import statement : jConnect The jConnect driver files
importing data : about Importing data into a database
importing data : conversion errors Handling conversion errors on data import
importing data : INPUT statement Importing data using the Interactive SQL INPUT statement
importing data : interactively Loading data interactively
importing data : LOAD TABLE statement Loading data using the LOAD TABLE statement
importing data : overview Import and export overview
importing data : performance Tuning bulk loading of data
importing data : temporary tables Loading data that does not match the table structure
IN keyword Using lists in the WHERE clause
IN keyword : CREATE TABLE statement Using additional dbspaces
IN keyword : matching lists Using lists in the WHERE clause
inconsistencies : avoiding using locks How locking works
inconsistencies : dirty read Using locks to ensure consistency
inconsistencies : dirty reads Three typical types of inconsistency
Selecting at isolation level 0
Selecting at isolation level 1
inconsistencies : effects of unserializable schedules Correctness
inconsistencies : ISO SQL/92 standard Three typical types of inconsistency
inconsistencies : phantom rows Three typical types of inconsistency
Tutorial 3 - A phantom row
Tutorial 4 - Practical locking implications
How Adaptive Server Anywhere implements locking
Selecting at isolation level 2
Selecting at isolation level 3
inconsistencies : typical Typical inconsistencies
inconsistencies dirty reads Tutorial 1: The dirty read
inconsistencies non-repeatable reads Three typical types of inconsistency
Tutorial 2 - The non-repeatable read
Selecting at isolation level 1
Selecting at isolation level 2
inconsistency Using locks to ensure consistency
inconsistency : example of non-repeatable read Tutorial 2 - The non-repeatable read
incremental backups : defined Backing up your database
incremental backups : performing Performing an incremental backup
indexes : benefits and locking Reducing the impact of locking
indexes : composite The effect of column order in a composite index
indexes : composite, hash values Hash values
indexes : creating Using indexes to improve query performance
indexes : hash values Hash values
indexes : how indexes work How indexes work
indexes : improving concurrency Special optimizations
indexes : inspecting Indexes in the system tables
indexes : Java Using computed columns with Java classes
indexes : Java columns Comparing Java objects
indexes : Java values How Java objects are stored
indexes : optimization and Indexes
indexes : performance Use indexes effectively
Using indexes to improve query performance
indexes : selection of during optimization Index selection
indexes : Transact-SQL Ensuring compatible object names
indexes : working with Working with indexes
inner joins : FROM clause Inner, left-outer, and right-outer joins
INPUT statement : about Importing data using the Interactive SQL INPUT statement
INPUT statement : interactive Loading data interactively
Insensitive cursors : about Types of cursor
INSERT permissions Granting permissions on tables and views
INSERT statement Using the LTM
INSERT statement : about Adding data using INSERT
Loading data interactively
INSERT statement : IDENTITY columns and Inserting values into specific columns
INSERT statement : Java Inserting Java objects
INSERT statement : JDBC Inserts, updates, and deletes using JDBC
Passing arguments to Java methods
INSERT statement : locking during Locking during inserts
INSERT statement : objects Inserting and retrieving objects
INSERT statement : performance Preparing statements
INSERT statement : SELECT Adding data using INSERT
Inspection window : Java debugger The debugger windows
INSTALL statement : class versions Java objects and class versions
INSTALL statement : introduction User-defined classes
INSTALL statement : using Installing a class
installation directory : about Installed files
installation programs : deploying Ways to distribute files
instance methods : about Instance methods and class methods
instances : Java classes Object oriented and procedural languages
instantiated : definition Object oriented and procedural languages
INT connection parameter : about Connection parameters
Integrated connection parameter : about Connection parameters
integrated logins : about Using integrated logins
integrated logins : creating Enabling the integrated login feature
integrated logins : default user Creating a default integrated login user
integrated logins : network aspects Network aspects of integrated logins
integrated logins : operating systems Using integrated logins
integrated logins : security Security concerns: unrestricted database access
Setting temporary public options for added security
integrated logins : security features Controlling database access
integrated logins : using Using integrated logins
Connecting from a client application
integrity : constraints SQL statements for implementing integrity constraints
Using table and column constraints
integrity : of data CHAPTER 14. Ensuring Data Integrity
integrity : of data using locks Using locks to ensure consistency
integrity : overview Data integrity overview
Interactive SQL : AUTO_COMMIT option Using transactions
Interactive SQL : command delimiter Check if you need to change the command delimiter
Interactive SQL : COMMIT_ON_EXIT option Using transactions
Interactive SQL : deploying Deploying database utilities and Interactive SQL
Interactive SQL : effect of exiting Using transactions
Interactive SQL : erasing databases Erasing a database
Interactive SQL : statistics window Using Interactive SQL to examine query performance
Interactive SQL : using Using Interactive SQL to work with database objects
interface libraries : connections Introduction to connections
interface libraries : locating Locating the interface library
interfaces : Java A Java glossary
interfaces file : configuring The interfaces file
interfaces file : Open Servers Set up the Open Servers in your system
interference : dirty reads Using locks to ensure consistency
interference between transactions Transaction blocking
Locking conflicts
interleaving transactions Correctness
INTO clause : using Returning results as procedure parameters
invalid data : types of How data can become invalid
IP address : about Adding or changing the server address
IP address : ping Testing a TCP/IP protocol stack
IPX : about The network layer
Using the IPX protocol
IPX : NetWare Tuning IPX performance
IPX : OS/2 Using IPX with OS/2
IPX : Windows Using IPX with Windows 3.x
IPX : Windows 95 Using IPX with Windows 95
IPX : Windows for Workgroups Using IPX with Windows for Workgroups
IPX : Windows NT Using IPX with Windows NT
IPX protocol : starting Selecting communications protocols
IPX/SPX Compatible Transport Using IPX with Windows for Workgroups
IR! settings : network adapters Configuring your network adapter board
IS NULL keyword Properties of NULL
ISNULL function : about Properties of NULL
ISO SQL/92 standard : concurrency Three typical types of inconsistency
ISO SQL/92 standard : typical inconsistencies and Three typical types of inconsistency
isolation level : applications Controlling the isolation level
isolation levels How locking works
isolation levels : about Isolation levels and consistency
isolation levels : and ODBC Setting the isolation level from an ODBC-enabled application
isolation levels : avoiding lost transactions Transactions for which no updates are lost
isolation levels : changing Setting the isolation level
isolation levels : changing within a transaction Changing the isolation level within a transaction
isolation levels : choosing Understanding and choosing isolation levels
isolation levels : choosing types of locking Tutorial 2 - The non-repeatable read
isolation levels : definition Isolation levels and consistency
isolation levels : implementation at level 0 Selecting at isolation level 0
isolation levels : implementation at level 1 Selecting at isolation level 1
isolation levels : implementation at level 2 Selecting at isolation level 2
isolation levels : implementation at level 3 Selecting at isolation level 3
isolation levels : setting default Setting the isolation level
isolation levels : versus typical inconsistencies Isolation levels and consistency
Tutorial 3 - A phantom row
Tutorial 4 - Practical locking implications
How Adaptive Server Anywhere implements locking
isolation levels : versus typical transactions Typical transactions at various isolation levels
ISOLATION_LEVEL option : Open Client Characteristics of Open Client and jConnect connections
ISO_1 collation : about Supplied ANSI collations