Label:Transferred from: http://www.cnblogs.com/lixiangfa/archive/2011/09/15/2178033.html Written back, Database Basics SummaryToday to a company written test, database test more, but to tell the truth, the test is also a relatively basic. Now while the memory is up, the database knowledge is simply organized as follows: First, the establishment of the table instructions For example, create a student table student, it consists of the number SNO, name sname, sex ssex, age
VALUES (' Dick ', ' math ', 92)
INSERT into Student0 VALUES (' Dick ', ' physics ', NULL)
SELECT * FROM Student0
Select [Name],
IsNull (sum (case subject
When ' language ' then result
End), 0) as ' language ',
IsNull (sum (case subject
When ' math ' then result
End), 0) as ' mathematics ',
IsNull (sum (case subject
When ' physical ' then result
End), 0) as ' physics '
From Student0
Group BY [name]
Copy Code code as follows:
--The subquery makes a
you can never writeSelect S#,sname,sage,ssex from StudentEndGoThere are parameter stored procedures:Global variablesA global variable, also known as an external variable, is defined outside the function and is scoped to the end of the program file, starting at the definition of the variable.Select student information for the specified name: Create proc Stuproc@sname varchar (100)AsBeginSelect S#,sname,sage
Tags: sel cottage Learning-fuzzy query predicate student har IkeConnection queries: Design query join conditions or join predicates for two or more tables: The conditional general format used to connect two tables:[[Equivalent connections:The join operator is =Find out about each student and elective courseMysql> Select Student.*, sc.* from STUDENT,SC where student.sno=sc.sno;+-------+--------+------+------+-------+--- ----+-----+-------+| Sno | sname | Ssex |
Tags: original otherwise examples page full create int param injectionMapper.xml tips:Create a new file in the 1:mapper package: MYBATIS-3-MAPPER.DTD2: In Web App libraries/mybatis.jar/org.apache.ibatis.builder.xml/mybatis-3-mapper.dtd, open, copy content, Post to yourself new MYBATIS-3-MAPPER.DTD3: The path to the DTD on the Mapper.xml header is the current directory!4: Close the Stumapper.xml file and reopen it, there is a hint!#{} and ${} differences: ${} does not value, regardless of data ty
I do not know whether we remember in the "Journey to the" in the Lotus Hole in the story of the Treasure, is the Monkey King skillfully grabbed the treasures, the gold and Silver Kok King that chapter. What does this story give us? What is the connection between this story and effective Java? Or continue the style of the article, read the code, read the story.
1import static org.junit.assert.*;2import org.junit.Test;345public class Testclone {67 @Test8 public void Testclone () {9//west to learn
VIEWD:grant61. To revoke a table s that already exists in the database, available | | c| |.A:delete TABLE SB:delete SC:drop TABLE SD:drop S62. To add a list of CNAME (course name) in basic table S, available | | c| |.A:add TABLE S (CName CHAR (8))B:add TABLE S ALTER (CName CHAR (8))C:alter TABLE S ADD (CName CHAR (8))D:alter TABLE S (ADD CName CHAR (8))63, Student Relations mode Student (sno,sname,sex,age), the attributes of Student respectively indicate student's number, name, gender, age. To
Label:DESC AA;select * from BB;/* Add sgender column to AA table, at specified position */ALTER TABLE BB add SS int first;ALTER TABLE BB add SGe char (3) after Sage;/* Delete sgender column for AA table */ALTER TABLE AA drop Sgender;ALTER TABLE BB drop column SGE;/* Modify the name of the column */ALTER TABLE AA change sage age;/* Modify the data type of the column */ALTER TABLE BB Modify SID Int (20);ALTER
database.
(2) set the score of all the students in the 01311 class to zero.
(3) Delete Course Selection records for all students in the 2001-level computer software class.
(4) The student LI Yong dropped out of school and deleted his records from the database.
Iv. Content of the internship report
1. Write the SQL statement for the preceding operation.2. What are the essential differences between the DROP and DELETE commands?
Run the Code:
*********************** *//** Find the student informat
Thrift-xiaoshe's column-blog channel-csdn. net
Thrift example
Category: Thrift
Read by 3164
Comment (2)
Favorites
Report
I use C ++, so I will give a C ++ example to briefly introduce thrift's getting started.
The example is described as follows: the student information (student ID, name, gender, age) is sent to the server by the client.
To implement this example, we have to do the following:
(1) write the. Thrift File
(2) generate a CPP File
(3) Com
be hard to be diligent and indifferent to words and deeds.
10. Abandon
To the holy saying: to hear the truth, Xi can die. Yan ziyue: Shun and he, and give to others. Mencius said: The self-violence cannot talk with any other words. The self-destruction cannot do with the promise. Old ancestor said: I am not a saint, and I have learned it. Sun Zi said: Shiga smell Buddha half-baked and want to give up his body, Huang Di along the wind knee line and asked Guang chengzi governing body but can grow
level like a feudal system, the gods have evolved for a long time. However, in the Taoist culture, the combination of mythical and legends of the people and the ideas in the school has developed a perfect fairy level system. The evolution process is not my specialty, so I will skip the Development Section and draw a conclusion directly. Hey hey :)Taoism believes that there is a sequence of Tao building, and there are high and low levels of sin. Therefore, there are also different levels of tast
inside the object are serializable, otherwise, it is necessary to carefully examine whether those objects that are not serializable can be set to transient, thus excluding them from the replication process.Shallow cloning is obviously easier to implement than deep cloning because all classes in the Java language inherit a clone () method, and the Clone () method does a formal shallow clone.Some objects, such as thread objects or socket objects, cannot be simply copied or shared. Whether using s
Promote
The eight commandments after a few months of "Monkey Search" website, for their upcoming web site from planning to technical applications have been already ready, just before the eight precepts will leave the mountain and mountain, Sun Dasan or give eight precepts to arrange the last class is also in the construction of a very important link-the site of publicity and promotion, Because the big sage according to own experience deep feeling: eve
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.