search
HomeDatabaseMysql TutorialSQL Server 2014 安装图解

SQL SERVER 2014 安装完成以后,不像 SQL SERVER 2008 R2 会提供一个 BIDS 开发工具,也不像 SQL SERVER 2012 会提供一个 SSDT 开

SQL Server 2014 企业版、商业智能版、标准版都支持的操作系统有:Windows Server 2008、Windows Server 2008 R2、Windows Server 2012、Windows Server 2012 R2。标准版还支持 Windows 7、Windows 8、Windows 8.1 操作系统。

详尽的安装需求,请参考官网《安装 SQL Server 2014 的硬件和软件要求》 (v=sql.120).aspx

安装 .Net Framework 4.0

SQL Server 2014必须使用 .Net Framework 4.0 。在使用图形化安装时,安装向导会自动安装。但是 Express 版的安装程序中没有包含 .Net Framework 4.0 的安装包,如果本机没有事先安装,那么安装向导需要临时从Internet下载。

给新到的 DELL 电脑装虚机,下载 SQL SERVER 2014,安装 SQL SERVER 2014。

SQL SERVER 2014 安装完成以后,不像 SQL SERVER 2008 R2 会提供一个 BIDS 开发工具,也不像 SQL SERVER 2012 会提供一个 SSDT 开发工具,也就是说 BI 的开发工具(SSIS, SSRS, SSAS)在安装完 SQL SERVER 2014 之后是没有的。需要单独的安装,这个内容会再另外一篇文章提到的。

下载地址

大家有兴趣的话,,可以不用去搜索了,在百度云盘里我共享了 SQL SERVER 2014 的英文版本。

SQL SERVER 2014 下载链接: 密码: 2hdm

安装过程

以下过程是在虚机上 WINDOWS SERVER 2008 R2 版本的操作系统上安装完成的,一般我自己的电脑除了 Office 和常用工具外,所有开发工具一定是上虚机的,因为每次升级工具的成本太高了。

双击 setup 安装。

SQL Server 2014 安装图解

New SQL Server ...

SQL Server 2014 安装图解

Evaluation 版本有 180 天左右的试用期,如果自己有 Key 的话就更好了。

SQL Server 2014 安装图解

下一步。

SQL Server 2014 安装图解

安装前检查,虽然在这一步成功了,但是后面却失败了,害的重新装了一遍 .NET FRAMEWORK 3.5 SP1。

SQL Server 2014 安装图解

下一步。

SQL Server 2014 安装图解

下一步。

SQL Server 2014 安装图解

更多详情见请继续阅读下一页的精彩内容:

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How do you alter a table in MySQL using the ALTER TABLE statement?How do you alter a table in MySQL using the ALTER TABLE statement?Mar 19, 2025 pm 03:51 PM

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

How do I configure SSL/TLS encryption for MySQL connections?How do I configure SSL/TLS encryption for MySQL connections?Mar 18, 2025 pm 12:01 PM

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

How do you handle large datasets in MySQL?How do you handle large datasets in MySQL?Mar 21, 2025 pm 12:15 PM

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)?What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)?Mar 21, 2025 pm 06:28 PM

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

How do you drop a table in MySQL using the DROP TABLE statement?How do you drop a table in MySQL using the DROP TABLE statement?Mar 19, 2025 pm 03:52 PM

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

How do you create indexes on JSON columns?How do you create indexes on JSON columns?Mar 21, 2025 pm 12:13 PM

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

How do you represent relationships using foreign keys?How do you represent relationships using foreign keys?Mar 19, 2025 pm 03:48 PM

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)?How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)?Mar 18, 2025 pm 12:00 PM

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Hot Tools

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function