Solved

Dropping not null constraint in db2 udb/WIn nt/unix

Posted on 2004-08-11
5
514 Views
Last Modified: 2008-03-17
I have a table d ( f float not null). Is there any way I can drop the not null constraint from the table.
Thanks in advance.
Mitra
0
Comment
Question by:amitra123
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 13

Accepted Solution

by:
ghp7000 earned 125 total points
ID: 11788959
if this column is part of the primary key, you can drop the primary key and re create a new one.
if this column is not part of the primary key but you want to make it nullable, export the data from the table, re create the table as required, re load the data.
0
 
LVL 50

Expert Comment

by:Lowfatspread
ID: 11796360
unfortunately the NULL/NOT NULL is a Column Option not a constraint from DB2/UDBs view on SQL

so you basicallt have to export and drop/recreate the table to change this...

 
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

November 2009 Recently, a question came up in the DB2 forum regarding the date format in DB2 UDB for AS/400.  Apparently in UDB LUW (Linux/Unix/Windows), the date format is a system-wide setting, and is not controlled at the session level.  I'm n…
Recursive SQL in UDB/LUW (it really isn't that hard to do) Recursive SQL is most often used to convert columns to rows or rows to columns.  A previous article described the process of converting rows to columns.  This article will build off of th…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question