Solved

FULLTEXT INDEX

Posted on 2011-03-10
3
354 Views
Last Modified: 2012-05-11
Stupid question, but how can I tell if a FULLTEXT INDEX exists on a table?
0
Comment
Question by:MariaHalt
  • 2
3 Comments
 
LVL 14

Expert Comment

by:Daniel_PL
ID: 35099563
USE <your db name>
SELECT * FROM sys.fulltext_indexes
0
 
LVL 14

Accepted Solution

by:
Daniel_PL earned 500 total points
ID: 35099593
Oh, you wanted table name, sorry:


SELECT t.name AS TableName, c.name AS FTCatalogName, OBJECT_NAME(i.object_id), i.is_enabled
FROM sys.tables t JOIN sys.fulltext_indexes i
  ON t.object_id = i.object_id
JOIN sys.fulltext_catalogs c
  ON i.fulltext_catalog_id = c.fulltext_catalog_id

Open in new window

0
 

Author Closing Comment

by:MariaHalt
ID: 35099653
Perfect!  Thanks.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
sql Total query 2 27
Replace Dates in query 14 40
SQL Server tables join on parse list 6 24
any adverse effect when modifying data type on a busy table. 4 13
SQL Server engine let you use a Windows account or a SQL Server account to connect to a SQL Server instance. This can be configured immediatly during the SQL Server installation or after in the Server Authentication section in the Server properties …
In this article we will get to know that how can we recover deleted data if it happens accidently. We really can recover deleted rows if we know the time when data is deleted by using the transaction log.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question