debugging (Debugging) and logging (logging) are very important when you are developing a program, but there are too many logging APIs available now because they're all good and it's hard to make a choice. The Foreign Java Forum also has some
MSSQL SERVER 2005 Math functions
1. To find absolute value
ABS ()
Select Fweight-50,abs (FWeight-50), ABS ( -5.38) from T_person
2. Power
Power (x,y) is used to compute the Y-exponentiation of X
Select Fweight,power (fweight,-0.5), Power (fweight,2),
The following are only references, and may be slightly different if there are multiple instances:
This environment is SQL Server Standard version 64-bit and SQL Server 2008 Standard version 64-bit dual instances installed simultaneously in a
On
Note
Compared to the DELETE statement, the TRUNCATE TABLE has the following advantages:
The transaction log space used is small.
The DELETE statement deletes one row at a time and records an entry for each row that is deleted in the
Workaround:
1. Change Table method
Your account may not be allowed to log in remotely, only in localhost. This time as long as the computer in localhost, login mysql, change the "MySQL" Database in the "User" table in the "host" item, from
1. Table Damage Reason analysisThe following are common causes of MySQL table corruption:
1, the sudden loss of power to the server caused data file corruption.
2, forced shutdown, did not first shut down the MySQL service.
3. The mysqld process
Solution MySQL does not allow remote access to the method
Workaround:
1. Change Table method.
Your account may not be allowed to log in remotely, only in localhost. This time as long as the computer in localhost, login mysql, change the "MySQL"
When the database server is established, the first thing we need to do is not to consider what MySQL-enabled programs are running on this database-supporting server, but how to recover to the last normal state after the database has been compromised,
server| Security | introduction | planning | data | database | Database security in the process of improving the security mechanism implemented by the SQL Server 7.0 series, Microsoft has built a flexible and powerful security management mechanism
Skills
Some of the techniques used by Sql*plus Sql*plus have many skills, and if mastered, it would be useful for rapid development and efficient maintenance of databases under Oracle databases. below accept one or two, 1. Using the
server| Security
Turn from: http://www.sqlsecurity.com
1. Confirm that you have installed the latest patches for nt/2000 and SQL Server, needless to say everyone should have been installed, but I think it is best to remind you here.
2. Evaluate
--Monitor whether the index uses
ALTER index &index_name monitoring usage;
Alter index &index_name nomonitoring usage;
SELECT * from v$object_usage where index_name = &index_name;
--To find the I/O distribution of data files
Select
server| Data | database | user RIGHTS | statement sp_helprotect
Returns a report that contains information about the user rights or statement permissions of an object in the current database.
Grammar
sp_helprotect [[@name =] ' object_statement '] [,
server|sqlserver| problem Http://www.richsearch.com/search/search.aspx?page=1&S1=%2B%E5%86%85%E5%AD%98%20%2B "sql% 20Server "
Allocate more memory to SQL Server (the default is dynamic allocation, you can change the minimum value to a larger
Many times, performance diagnostics on a database can be done using SQL tracking, and some information is then parsed in the trace file. In general, we can set up the SQL Trace by initializing the parameter sql_trace=true.
We can also
Data Oracle Data Dictionary is one of the important parts of database, it is produced with the database, which changes with the change of the database, and embodies some tables and views under the SYS user. The data dictionary name is an uppercase
Data | database
--------------------------------------------
Experimental environment: WINDOWS + Oracle 10.1.0.2.0
Original database: ning[archive mode] Copy database: Test
Author:ningoo 2005-3-27
-----------------------------------------
server| Recovery | data | Database ANY database system can not avoid the collapse of the situation, even if you use the clustered, dual-machine hot standby ... It is still not possible to completely eradicate the single point of failure in the
server| Security
SQL Server security issues have always been a challenge for DBAs, as developers and users want their permissions to be as large as possible, preferably SA, and as a DBA, it's always a contradiction to expect all user rights to be as
server| Stored Procedures
Extending stored procedures in SQL Server is not a lot of opportunities to use directly
I summarize the ways in which I know how to use some of the useful extended stored procedures as follows:
--Get MS SQL
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service