Shared SQL zone, private SQL zone, and cursor
I. Share the SQL ZoneThe shared SQL zone is another way of calling the handle of the cursor object in the Library cace and the data of the Child heap.Ii. Concept of private SQL ZonePrivate S
1. Execute DDL and DDL statements (except select)
A) open a cursor.
B) analyze the statements to be executed
C) bind any input variables that may be required
D) execute the statement
E) Close the cursor.The execution of the SELECT statement is as follows:
Set serveroutput on;
Declare
V_cursorid number;
V_selectrecords varchar2 (500 );
V_numrows integer;
V_mynum integer;
V_mytext varchar (50 );
Begin
V_cursorid: = dbms_ SQL .open_cursor;
V_selectrecord
Tags: LTE tin tac hit Lex supports RAC query statement testingIn our Java development application process, will inevitably encounter the system performance problems, especially in the enterprise application development process, will deal with the database. When we encounter database performance, the most effective is to directly track the execution of each SQL statement, the optimization of SQL statements,
, you can introduce it from the new ledger. If it is a master table, it may be recovered through recent backups. If there is no backup, it cannot be repaired.1.3 why is the SQL Server database vulnerable to damage?The following are some possible causes of database damage provided by Microsoft and some preventive measures:Operation problems, including cold start machine, hot hard disk pulling, and deletion o
Label:A small SQL Server DBA wants to talk about the capabilities of SQL ServerBaidu has not yet searched for relevant individuals to write more valuable articles, at least in the Chinese network of the world there is noBut there is an article on Microsoft's website: "Comparing SQL Server with IBM DB2"The article compares from the following aspects1. TCO and ROI2
MSSQL provides us with two commands for dynamically executing SQL statements, namely exec and sp_executesql, and generally, sp_executesql has the advantage of providing an input-output interface, and exec does not. One of the biggest benefits is the ability to reuse execution plans with sp_executesql, which provides execution performance and can write more secure code. EXEC will be more flexible in some cases. Unless you have compelling reasons to use
Label:Introduction The transaction log in SQL Server is undoubtedly one of the most important parts of SQL Server. Because SQL Server uses transaction logs to ensure persistence (durability) and transaction rollback (Rollback). This also partially ensures the acid properties of the transaction. When SQL Server crashes,
SQL Server 2000 T-SQL operation
T-SQL (trantsact-SQL) is a structured query language developed by Microsoft on the basis of Sybase.ProgramAnd the tools for communicating and accessing stored procedures with SQL Server. Included ansi89 and ansi92 standards. So T-
Remote connection SQL Server 2008, server-side and client configuration
Key settings:
The first step (SQL2005, SQL2008):
Start--> program-->microsoft SQL Server 2008 (or the)--> Configuration Tool-->sql Server Configuration Manager-->sql Server network configuration--> MSSQLServer (this name is the exact instance na
SQL is required. Take notes. Chapter 2 describes advanced SQL features. SQL is required.22.1 Constraints
To correctly design a relational database, you need to ensure that only valid data is inserted in the table. For example, if the Orders table stores order information and the OrderItems table stores order details, ensure that any order IDs referenced in Orderi
PremiseWhen this article discusses only SQL Server queries,For non-composite statistics, where the statistics for each field contain only the data distribution of theHow to estimate the number of rows based on statistical information when combining queries with multiple fields.The algorithm principle of estimating the number of data rows using statistics from different fields, and the differences between SQL
SQL statement to query the SQL Server name and IP address, SQL Server
Get Server Name:
SELECT SERVERPROPERTY('MachineName')select @@SERVERNAMEselect HOST_NAME()
To obtain the IP address, run the ipconfig command in xp_cmdshell:
-- Enable xp_cmdshell exec sp_configure 'show advanced options', 1 reconfigure with override exec sp_configure 'xp _ cmdshell', 1 reconf
SQL statement to query the memory usage of SQL Server, SQL Server
SELECT type, -- Clerk type sum (bytes) as vm_Reserved_kb, -- reserved memory sum (bytes) as vm_Committed_kb, -- Submitted memory sum (awe_allocated_kb) as awe_Allocated_kb, -- the memory used after AWE is enabled sum (bytes) as sm_Reserved_kb, -- shared reserved memory sum (bytes) as sm_Committed_k
Oracle Advanced SQL (4) -- SQL column and column conversion topic 2, oracle -- SQL
[Previous topic] column-and-column conversion 1-Introduction to functions of aggregate and unaggregate
Implementation case 1001: lufei1001 shanzhi1001 namei1001 qiaoba: 1001 lufei, shanzhi, namei, qiaoba typical row-column conversion: there are many ways to achieve this.
Here, the
Summary of five methods to effectively prevent SQL injection, and 5 methods to effectively prevent SQL Injection
SQL Injection
SQL injection is a type of attack that causes great harm. Although the attack is very harmful, the defense is far from as difficult as XSS.
The cause of the
If you establish a connection server with a 32-bit database server on a 64-bit computer and use the connection server for Distributed queries on 64-bit computers, the following error message is returned:
Server: Message
7399
, Level
16
, Status
1
, Line
1
Ole db Provider
'
Sqloledb
'
Reported an error.
[
OLE/DB Provider returned message: unspecified error
]
[
OLE/DB Provider returned message: the stored procedure required to complete this operation cocould no
This article is purely gossip and basically has no practical value. Oracle always uses SQL _ID to mark a unique SQL statement. SQL _ID corresponds to SQL _TEXT one by one. If the two SQL texts are different, including spaces and other invisible characters, the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.