server| Access | Three methods for data access to Microsoft SQL Server meta data
Shanghai Minimally Invasive Software Co., Ltd. Xiaoguidong
For readers: Microsoft SQL Server, advanced users
Introduction to meta-data
The most common definition of metadata (metadata) is "structural data about data," or, more simply, "inf
1. Access Data Type
Byte number [bytes]
Long number [long integer]
Short number [integer]
Single number [single precision]
Double Digit [Double Precision]
Currency
Char text
Text (n) text, where n indicates the field size
Binary
Counter automatic number
Memo remarks
Time date/time
In my personal opinion, the most important type is "Yes/No". Bit or yesno can be written. You can search for details. It seems that there are many related materials.
2. Cr
This article explores the benefits of access and the SQL Server consolidation process and provides links to more in-depth analysis and migration processes ...
Microsoft access is a simple, easy-to-use development tool that can write access programs even if you don't have development experience. There may be internal
Create a job and execute the following command:Exec master .. xp_mongoshell 'HTTP: // srm.rapoo.cn? Op = sapintferace I = 1 t = 1'Activate and execute synchronization stepsThe following describes how to enable xp_mongoshell to extend the Stored Procedure commands.I. IntroductionThe xp_cmdshell extended stored procedure uses the command string as the operating system command shell for execution and returns all the output in the form of text lines.Iii. xp_cmdshell in
("select_activity", con );
// Specify the command type as stored procedure
Cmd. CommandType = CommandType. StoredProcedure;
// Create a dataset
SqlDataAdapter adapter = new SqlDataAdapter (cmd );
DataTable table = new DataTable ();
Adapter. Fill (table );
DataRow Dr = table. Rows [0];
Response. Write (Dr [3]. ToString ());
}
2. Because the previous blog does not create a stored procedure with only one parameter, the creation process is as follows:
-- Create a stored pro
A system vulnerability package in gionee may leak the IMEI serial number of 3.69 million users (unauthorized access/SQL injection)
Export the IMEI serial number file of the 3.69 million user in one click, and calculate 20 rank
Http: // 218.16.100.212: 8080/gionee/weibo/imeiManager! List can be accessed directly without logon
Built-in export FunctionExport the data of January 1, December 27
A total of Ja
when I started the win7 firewall during the test, just close it)
Summary:
Notes for IIS:
1. register the. Ent framework
2. register the WCF Ria service (or set the copy local attribute of the relevant DLL to true)
3. Pay attention to the authentication method of applications. Generally, Forms authentication and anonymous authentication are enabled.
4. Pay attention to the application pool settings
5. SQL Server Authentication and database connection
However, before SQL server 2005, SQL SERVER 2000 did not provide this direct function for us to use. The same is true for ACCESS.
The following describes the implementation process of data ranking in two cases. The test data is as follows:
The result after ranking is as follows:
AccessCopy codeThe Code is as follows:Select name, score, (select iif (isnull (s
Environment: Windows + SQL Server 2008One installation Mysql-connector-odbc-5.2.5-winx64.msiMust be installed 5.2.5, installation mysql-connector-odbc-5.3.4-winx64 will errorTwo configuration ODBCAfter installation in the Control Panel-"Management tools-" data source (ODBC)-"system dns-" added, you must select ANSI Driver, otherwise Chinese garbledCreate linked servers in three SQL ServerFour test linked se
if not yet.4, sometimes may appear the client to the Chinese support bad question, may refer to the following third article environment variable setting:On the desktop, right-click My Computer, select Properties, select Environment variables in the Advanced page, and in the system variables, increase:1) variable name: oracle_homeVariable Value: E:\instantclient_11_22) variable name: tns_adminVariable Value: E:\instantclient_11_23) variable name: Nls_langVariable value: Simplified Chinese_china.
To create a job, execute the following commandEXEC master. xp_cmdshell ' Http://srm.rapoo.cn?op=sapintferacei=1t=1 'Activate to perform a synchronous network stepThe following is from the network, which describes how to enable the xp_cmdshell extended stored procedure to commandFirst, IntroductionThe xp_cmdshell extended stored procedure executes the command string as the operating system command shell and returns all output as a text line.Iii. xp_cmdshell in
Access's SQL view can execute only one SQL statement at a time, so calling in VBA might be a little easierFor example:Public Sub Batch ()Dim strSQL as StringstrSQL = "INSERT into TEACHER (Tno,tname,tsex,tbirthday,prof,depart) VALUES (804, ' sung ', ' Male ', ' 1958-12-02 ', ' associate Professor ', ' computer Department ');"CurrentProject.Connection.Execute strSQLstrSQL = "INSERT into TEACHER (Tno,tname,tse
activityName = @ activityName
-- Call the stored procedure. when calling the stored procedure, declare the parameter @ answer for receiving the output parameter and the parameter type.
Declare @ answer int
Exec select_MathResult 'competitive match ', @ answer output
Select 'result is ', @ answer
This completes the SQL Server Stored Procedure review. In the next article, we will introduce how to use ADO. NET to
Application Server 1.0.2.2.2Oracle Oracle9i Application Server 1.0.2.2Oracle Oracle9i Application Server 1.0.2.1sOracle Oracle9i Application Server 1.0.2Oracle HTTP Server 9.2.0Oracle HTTP Server 9.1Oracle HTTP Server 9.0.3.1Oracle HTTP Server 9.0.2.3Oracle HTTP Server 9.0.2.3Oracle HTTP Server 9.0.2Oracle HTTP Server 9.0.1Oracle HTTP Server 8.1.7Oracle HTTP Server 1.0.2.2 Roll up 2Oracle HTTP Server 1.0.2.2Oracle HTTP Server 1.0.2.1Oracle HTTP Server 1.0.2.0Description:------------------------
the analysis services server on the same machine.
5. Configure analysisservice)
Add a role to the database: Set the database permission to full control, and specify the user and group for the role in the member identity: iuser.
You can use IIS to access remote analysis services.
6. Deploy WebService on IIS (Machine 2 Operations)
Refer to the URL above to set authentication as "Anonymous Authentication"
7. How to
Transferred from: http://www.cnblogs.com/gaizai/archive/2011/07/14/2106617.htmlFirst, DemandIn the management of the database process, we often need to control the access of a user to the database, such as only need to give the user access to a table permissions, or even crud permissions, the smaller the granularity can go to a few fields access rights. Writing
★Kneeling and crying for help: PHP cannot access the SQL temporary table after creating it !?★The procedure is as follows: click a link to trigger a function. select * into # tempfromA is used in the function, and select * from # temp can display the content in # temp. Click a link again to trigger a function. only select * from # temp is used in the function. the returned result cannot be displayed # t★Kne
After the installation is complete, MySQL uses a blank password by default. You can set a password for the root user. Note the case sensitivity: mysqlSETPASSWORDFORroot @ localhostPASSWORD (admin ); log on to mysql and use the root account $ mysql -- userroot -- passwordrootmysql to authorize the root account to remotely access mysqlgrantallpriv
After the installation is complete, MySQL uses a blank PASSWORD by default. You can SET a password for the
★Kneeling and crying for help: PHP cannot access the SQL temporary table after creating it !?★The procedure is as follows: click a link to trigger a function. select * into # tempfromA is used in the function, and select * from # the result returned by temp is displayed. #★Kneeling and crying for help: PHP cannot access the S
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.