Generally, you can use the dbms_transfer_file package and rman method to transfer files between the ASM instance and the file system, or the FTP method. The XMLDB is required for FTP,
Generally, you can use the dbms_transfer_file package and rman
The AWR report is an important tool for us to study and analyze Oracle performance, especially the operating characteristics of applications. After entering 10 GB, with the popularization of CBO and the establishment of automatic operation mechanism
Frequently used databases do not use indexes. 1. use ,!, ^ If no index is used, you can use inor or rewrite www.2cto. com2.isnull does not use an index. to avoid this, define the index as non-null or use the default value to search. 3. isnotnull is
No detailed content paging Oracleselect * from (selectrownum, namefromtablewhererownumendIndex) whererownumstartIndex
No details paging Oracle select * from (select rownum, name from table where rownum = endIndex) where rownum startIndex
Multiple like queries may result in a large amount of duplicate data. No problem description two table tables: usersidusername1andy2jack3leo4kimi table caridtitleuseridchnname1bmw7501 BMW 2bmw5301 BMW 3bmw2 BMW 4benzc21 Mercedes
Multiple like
Including: check the running SQL statement, the session tablespace in a service to manage the currently active user information in the lock status database .... These codes are well written by dbadmin as an American DBA. in googldecode,
No details none-data of the row where the maximum (small) value is located is grouped by a certain field * data is as follows: namevalmemoa2a2 (second value of) a1a1 -- the first value of a a3a3: The third value of a b1b1 -- the first value of B b3b3
Determines whether the integer is a prime number. No CREATEFUNCTIONCheckPrimeNumber (@ NoBIGINT) RETURNSTINYINTASBEGINIF @ No1RETURN0DECLARE @ maxVBIGINT, @ IndexBIGINTSET @ maxV @ No
Check whether the integer is a prime number. No create function
SQLServer2000 security configuration
SQL Server 2000 security configuration
Before configuring SQL Server 2000 database security, you must configure the operating system security to ensure that your operating system is in a safe state. Then,
SQLServer full-text index service
SQL Server Full-text index service
The full-text retrieval method of SQL 7 is similar to that of Index Server.
Contains
AND, OR, NOT
Logical expressions can be easily used in Contains.
Example:
Select username
There are several dangerous extended stored procedures in the MSSQL Database. by default, the Public Group has executable permissions, which can be used by SQL injection users to read file directories and user groups, you can write dangerous scripts
To allow automatic database management, the administrator needs to pre-define predictable management tasks and conditions for sending these tasks.
To allow automatic database management, the administrator needs to pre-define predictable management
Three methods to search for subnodes in a data table are as follows:
Three methods to search for subnodes in a data table are as follows:
Example:
Table structure:
Id ParentId
1 0
2 1
3 2
......
The table structure is described as follows:
The
Try to add it to an abnormal system with the registry key of the normal system. (Because the two systems have the same version and structure, you can directly import and export the registry key for batch modification ).
Try to add it to an abnormal
Use the sysobjects and syscolumns system tables to locate each column in each table. if the column type is string type, such as varchar and nvarchar, use a cursor to update these columns.
Use the sysobjects and syscolumns system tables to locate
Example of how to delete text field replacement in the MSSQL database-full table replacement. after reading a question, I sorted out a long time ago for your reference.
Example of how to delete text field replacement in the MSSQL database-full table
SQL replace all the table content in batches.
SQL replace all the table content in batches.
The code is as follows:
Declare @ t varchar (255), @ c varchar (255)
Declare table_cursor cursor for select a. name, B. name
From sysobjects a,
Tabele has a lot of information to be searched online. You can use online copy to implement the functions you want. But after implementing the function, have you ever wondered why the row-to-column conversion function should be written like this?
There are three common join methods for databases: innerjoin, leftoutterjoin, and rightoutterjoin (there is also a fulljoin, which is not commonly used and will not be discussed in this article ). These three join methods combine two or more tables
This time, we conducted a stress test on mysql for a single table containing hundreds of millions of data records. The relationship between tables is simple. there are only two int fields, user_id and company_id, and indexes are added. The python
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service