ON DELETE CASCADE and the CASCADE CONSTRAINTS - what are the difference?

I know that CASCADE CONSTRAINTS would allow me to remove the parent key and the reference of the following children will be freed from the constraints. However, the child columns will remain and will be set to NULL.

SO:

If the CASCADE CONSTRAINTS could do the job, why do we need on REMOVE CONSTRAINTS?

Unnecessary extra Note:

I know that YOU DELETE CONSTRAINT is defined with the child. When I tried to delete the parent key without having the CONSTRAINTS of the WATERFALL, I got an error message indicates that the parent key has childs! So ON DELETE CASCADE was not up to what I had to mention the CASCADE CONSTRAINTS when deleting the parent key while the CASCADE CONSTRAINTS worked fine without ON DELETE CASCADE on the side of the child.

I hope that my question is simple...

A foreign key with a delete cascade means that if a record in the parent table is deleted, then the corresponding records in the child table with automatically deleted. This is a deletion of the waterfall.

Forced to cascade deletes all foreign keys that reference the table to remove, and then deletes the table.

Tags: Database

Similar Questions

  • How can I completely remove Realplayer or other similar plugins of Firefox (I have deleted Realplayer and the Realplayer program files)?

    Hello, I find that Firefox often hangs and it says not responding do not when I try to open a new page, and also that it takes a long time to clear cookies and cache. I read elsewhere that the second problem may be due to plugins, and I found many of them, which I did not need such as Realplayer. So I was wondering if there is a way for me to start from scratch without any plugins at all and then I install everything needed?

    I have reset Firefox, uninstalled and reinstalled and also deleted Realplayer and the Realplayer software files, but nothing seems to change (there are other plugins too that I do not think that I use, like VLC Web Plugin - I only use VLC to DVD - which could also be the cause of the problem).

    You can find the installation path of the plugins on the topic: plugins page.

    See also manually "uninstall a plugin:

  • Deleted folders and the content of the email from my Hotmail account

    Hello

    I helped put my old computer to his mother in laws House. I have thoughtn I want to delete files, etc. I had gone to my hotmail account and unfortunately brain off and I deleted my files and the contents that were in my hotmail account. Can someone help me. Can someone recover them for me. One or two of them are very important to me.

    They may be gone forever, but you can search here:

    The hotmail community forums
    http://windowslivehelp.com/community/default.aspx

    Solutions Center Online hotmail
    http://windowslivehelp.com/default.aspx

    Solutions for common problems
    http://windowslivehelp.com/solutions/

    TaurArian [MVP] 2005-2010 - Update Services

  • CS5 and 64-bit supported: what are the implications?

    Hi people,

    I would ask the question like this: 64-bit support means I'll have to buy the machines 64-bit for my copy of CS5?

    Thank you for your help.

    Yes, you will need to have a 64-bit operating system and a 64-bit processor.

    For Mac OS, Leopard (10.5) and Snow Leopard (10.6) are already capable of running 64-bit applications, and any Macintosh sold in recent years can run 64-bit applications.

    For Windows, you need Windows Vista 64-bit or Windows 7 64-bit.

    For system requirements, see this page:

    http://www.Adobe.com/products/AfterEffects/systemreqs/

  • Type of failover and the difference

    Hello

    I would like to know what are the different type of failover in PIX 515E with 6,3 OS.

    I want all the details of it.

    I am aware of LAN-based failover and failover with cable to failover.

    Why the failover cable is use and it is important.

    can any 1 give me details.

    Kind regards

    Riahi

    Hello

    hope this link helps.

    http://Cisco.com/en/us/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a008017278a.html

    regds

  • Size of the placed Image and the difference in quality

    Hello world

    I'm under Indesign Adobe cs6 Version 8.01

    I have a document which is 2048px x 1536px (for iPad resolution Retina display).

    I reszied all my images to about 1140px x 760px at 300PPI

    When I place images in Indesign it resizes the image to 180px x 272px

    The number of effective pixels and actual pixels are 300 PPI resolution that I've resized the in photoshop under the links section

    The quality of the preview is set high quality

    In the File Handling preferences preserve Image Dimensions when the restoration of the links are on

    I tried to save the image in Jpeg, Tiff and PNG formats to solve the problem

    I set my default object style Frame Gun on site and be sure to adjust automatically is checked and the editing of content is set to None.

    What can be done to rememdy this problem?

    I want just the images that I've resized in Photoshop CS6 to be placed in the exact dimensions that I've resized to do the set up files simple and easy.

    If you can please help with this problem as soon as possible I would be very happy.

    Thank you very much

    Save images to 72 dpi (without resampling), or their scale in ID.

  • free vSphere Datastore space and the differences in size of VMDK

    I am listing and sizes VM reports and the amount of space they take on their related data storage. I used PowerCLI to capture this information and have issued the following command to retrieve the data store size and free space: Get-data store. Returns a name, quality and free space. Then, I want to see the size of the VMDK on these data stores using the: Get-Datastore. Get - VM | Get-hard drive. This returns the size VMDK in KB and after you convert in the UK, I sum up the totals and calculate space to subtract from the total size of the data warehouses. I have a lag in information in free space. For example:

    Name FreeSpaceMB CapacityMB

    vSphere 1 63634 511744 storage

    vSphere 2 60576 511744 storage

    The data that I get of you add up all the VMDK located on these two stores of data then subtracting total capacity does not equal free space above. I did this on our entire VM infrastructure and continue to run on this issue. The VMDK must reside somewhere, so why they bring two different digits? Is there a any correlation between the VMDK size and free space? Often my data are disabled by nearly a terabyte.

    In this case less than 50 GB, remember to file vswp, etc.

    But sometimes report is simply wrong in vSphere Client, you can get accurate information in the service console.

    ---

    MCSA, MCTS Hyper-V, VCP 3/4, VMware vExpert

    http://blog.vadmin.ru

  • Unlike COUNTY and the difference in data between 2 sets of data

    Hey guys,.
    I have a question here, probably, it revolves around the UNION, INSERSECT and LESS and maybe something else I'm missing.

    I'm two sets of questions, and I have 2 paintings.
    select count(student_id) from adhoc_student_table1;
    select count(student_id) from adhoc_student_table2;
    
    select student_id from adhoc_student_table1 order by student_id;
    select student_id from adhoc_student_table2 order by student_id;
    These tables contain data and have been sorted by student_id. I want to find the difference in NUMBER between the first set of SELECT and I want to find a difference in the student ID in the second set to SELECT.

    Any ideas? As always, any help is appreciated!

    Hello

    These tables do contain data and have been sorted by student_id. I want to find the difference in COUNT between the first set of SELECT and I want to find a difference in Student IDs in the second set of SELECT.
    

    Hope this helps

    select (select count(student_id) from adhoc_student_table1) -
       (select count(student_id) from adhoc_student_table2) from dual
    
    ---If you want the difference in first table not available in second table.
    
    select student_id from adhoc_student_table1 order by student_id
    minus
    select student_id from adhoc_student_table2 order by student_id
    
    -- or you wanted the difference from both table.
    with tab1 as
    (
       select student_id from
          adhoc_student_table1
    )
    tab2 as
    (
        select student_id from
    adhoc_student_table2
    )
    select * from (select student_id from tab1
                         union select student_id from tab2)
    minus
    select * from (select student_id from tab1
                        intersect select student_id from tab2)
    )
    

    If you could post the input samples and expected, maybe you can get a more valuable solution.

    Concerning
    Anurag Tibrewal.

  • I can't delete photos and other files. These are my own files and they are not open on the computer.

    Of recent, I am unable to delete files or photos.
    These are my own files.  They are not in use elsewhere on the computer.
    When I try to delete, the Microsoft 'circle work' rises and lasts forever.
    I can't get out of this mode.  Finally, after trying to escape from this command, the box comes in asking me if I really want to delete the file.
    How can I get my computer to normal operation removing?

    ......... Of recent, I am unable to delete files or photos.

    Consider a problem in recebt?

    If Yes, do you remember a "good date" when you could remove personal files?

    If Yes, please do a system restore.
    Choose this "good date" or before as your restore point.

    http://www.howtogeek.com/HOWTO/Windows-Vista/using-Windows-Vista-system-restore/

    If system restore is not working or not a option, please do a check of the file system. It's to look for corrupt files. He will try to fix it if it is found.

    http://www.Vistax64.com/tutorials/66978-system-files-SFC-command.html

  • My email is hacked I have to delete it and the password

    My email has been hacked. I installed a new account. You need to remove the old one and other relevant details that I must.

    Change of Auditors in an e-mail client would not affect the box mailbox itself, apart from the fact that you will stop making reference to the mailbox.  The hacker will always have control over this mailbox and can still access all personal data resident in it.  If you used to leave a copy of messages on the server, the hacker can see everything that you wrote, including the e-mail addresses of all those who have sent messages.  If the email contains sensitive information, the hacker still has that as well.  If you have kept your contacts online in the mailbox, the hacker has those too.

    If you can still connect to the mailbox through a web browser, you can stop the pirate.  If you wish to continue using the mailbox, simply change the password to something long and a mixture of lower and uppercase, letters, numbers, and special characters.  If there are security issues, change their answers to these questions so, specifying the wrong answers you remember.  For example, if a security is "what city were you born?", answer "Moonbase Alpha" or some other nonsense response and then remember the answers that you used.  Check to make sure none of the secondary addresses have been added to the account or the hacker may be able to access it again.  Make sure that the primary address is always yours.  With this type of approach, you should be able to secure your mailbox again.

    If you do not keep copies of messages on the server, the hacker can't do much use the account because it does not contain a lot of information and abandonment it's a way to fix the problem.  The hacker doesn't have access to any of the data on your PC itself (unless you have some sort of spybot on your PC), so it is not necessary to disinfect local data.

    Such a compromise has become quite common these days and a couple of the reasons are because people 1) access their online resources of networks unprotected and open like those found in cafés Internet, Starbuck, or same McDonald and 2) they do not use SSL for the connection, it does not the service or because they do not realize that they should.  When using an online service such as, for example, Facebook, we should allow the security option in the profile security settings to use "https" all the time or access to the service with https:// instead of http://...  This encrypts communications and your traffic can be sniffed with common tools to steal credentials like Firesheep, a plug-in for the popular browser Firefox.  In an e-mail client, incoming and outgoing servers should also allow (or require) encrypted connections (SSL or TLS) and if they are not, you should never use an e-mail on a public network client.

    Brian Tillman [MVP-Outlook]
    --------------------------------
    https://MVP.support.Microsoft.com/profile/Brian.Tillman
    If a response may help, please vote it as useful. If a response to the problem, please mark it as an answer.

  • BlackBerry Smartphones what the purpose and the difference between Blackberry devices and software updates to the Blackberry Manager?

    I got my new Blackberry Curve 8330 3 weeks red and I installed the BB Desktop Manager that comes with the CD called Blackberry user tools.   Now when I click on "updates" on the lower part of the Desktop Manager, a popup window with all sorts of information that I don't know where to go first.  My version of the op is a 4.3.0 xxx what is desktop software for? Is this software integrated with the Desktop Manager, or is it a separate thing?

    Hope to hear from you beautiful peeople soon to explain this for me!

    Not necessarily. I'm a tech person, so I'd rather have the latest greatest version of ang of the software I use. So if you are happy with 4.3 and it is not crashing or causing errors so feel free to continue using it.

    You can always try 4.7 and if you don't like it uninstall and reinstall 4.3

  • Deleting snapshot and the functionality of vCenter

    Hello

    Deleting a snapshot of a VM large that could take a few days based on the current speed. And upgrade vCenter 5.1 to 5.5.

    Deleting capture instant impact upgrade deal with? Or it is a strictly local operation on the host?

    Thank you in advance!

    Arkady

    It's strictly local operation in the host until it's not vcenter himself. You can upgrade your vcenter without any problem if the snapshot deletion process is with some other VM. It will keep continue...

  • quick and dirty backup? What are the files?

    Hello

    I'm looking to export a virtual machine of my SAN to an external target as a backup 'rapid '. I would do this using the browser to store data and export to a local computer.

    question: what should I copy should I have to "restore" this virtual machine to the operating state? The hard only, or all that it?

    I want to do it via the USB port, but my blade chassis does not provide direct access.

    Yes, turning off your virtual machine, copying the vmdk and vmx files and will allow you to 'restore' the virtual machine if necessary.

    You can use the browser to store data or tools like FastSCP.

  • For the last 2 days everytime I open to MY MSN, it opens in safe mode. I deleted cookies and the history of FF. all other sites open OK. Vista, 64-bit operating system.

    Vista 64 bit OS

    Thanks for the replies, the problem was on the Microsoft site itself and internal glitch for the last 2 days on the garbled causing MY MSN page without graphics and text.

  • Time of the value of a prepared statement and the differences in execution plan

    Hi guys... I have a doubt here that I was not able to specify the search on the internet.

    Is on prepared statements...

    When I do: con.prepareStatement (query);

    then the query is compiled and an execution plan is for this query on the database, I know. But what happens when I do con.close. Is the accessible yet statement caching other executions? to make this example:

    Suppose we are joining 20 tables and we have about 10 parameters for this query

    public ArrayList getData(String id1, String id2, String id 10) {       ArrayList response=new ArrayList();       Connection con=manager.getConnection();       String query="select name, phone, debtvalue, currency, etc from table1, table2, table3, table4, table20 where                           table1.id=table2.t1id and table2.id=table3.id and table2.fid=? and table1.fid=? and etc etc";//a big query       PreparedStatement pst=con.prepareStatement("select");       pst.setString (1, id1);       pst.setString (2, id2);       pst.setString (3, id3);       .       .       pst.setString (10, id10);       ResultSet rs=pst.executeQuery();       while (rs.next()) {               //do whatever and build the response ArrayList       }       rs.close();       pst.close();       return response; }

    Will be the compilation of the prepared statement and this execution plan is available for every performance of the getData method. Or a new plan of compilation and execution is calculated whenever I execute the method? Assuming that the running query takes a long time to maturity it its complexity and runs about 100 times a day in a production environment. It is advisable to use the prepared statement?

    Is the precompiled stuff avaible if I use a "" "NEW" "" said PreparedStatement with the same query?

    Thank you very much in advance for your answers...

    Published by: user4789473 on 25-mar-2013 17:14

    If you lose / close the statement prepared, Yes, you lose the ID. If you prepare again the same
    SQL, the DBMS must analyze the SQL code again, if to see if there is a query plan
    still/already existing for the DBMS session. According to the DBMS, it may or may not
    find/have/use plan, he created for the previous statement.

Maybe you are looking for