select * FROM Dbo.pvtcustorders
3 Select Custid,years,qty
4 from Dbo.pvtcustorders
5 Unpivot (Qty for years in ([2002],[2003],[2004])) as up
6 GO
7--A dynamic scenario for a career change: Unpivot, Sql2005 and later version
8-because the line is dynamic so here is the information_schema. The columns view gets the columns to construct the rows, and the XML processing is also used.
9 DECLARE @SQL NVARCHAR (4000) =n ";
The SET @SQL =stuff ((SELECT N ', ' +quotename (column_name) from INFORM
ORDER BY User_name,courseYou can also make use of the insert all into ... Select to first build a table test_tb_grade3:SQL code:1 CREATE TABLE Test_tb_grade32 (3 user_name VARCHAR2 (CHAR),4 COURSE VARCHAR2 (CHAR),5 Score FLOAT6)Then execute the following sql:SQL code:1 Insert All2 into Test_tb_grade3 (User_name,course,score) VALUES (user_name, ' languages ', Cn_score)3 into Test_tb_grade3 (User_name,course,score) VALUES (user_name, ' math ', Math_score)4 into Test_tb_grade3 (User_name,course,sc
People of different ages may have different feelings and ideas. Some people suddenly find themselves confused about their future and do not know what to do in the future. Some people want to go abroad with gold plating, improve their own quality,
1, I am 23 years old this year.
2, just engaged in PHP, know the work experience of predecessors can let me go a lot less detours, sincere advice.
Reply content:Don't quite agree upstairs to answer anonymously.
The improvement of technology is the
A prestigious international
ComputerWorld (Domestic "
The American original of Computer World) was written by a woman journalist two days ago.
"Thetop10dead (ordying) Computerskills" (Ten dead and dying it technologies and occupations) a
I have entered the programming industry for more than 2 years. Sometimes I feel like I'm not very good at being a programmer.
1, find yourself learning new things a little passive
2, learn new things when they feel a little slow, not quickly start
September 8, Tuesday, on a day class, there are four days class, not counted overtime, think about the heart tired, you oscer you okay?@ Bear two : One day a programmer saw God. God: Lad, I can satisfy you with a wish. Programmer: I hope the Chinese
Relative to the elementary level that is constantly on the road of developmentCIO (Chief Information Officer)Or quasiCIOThose who have passed the initial career period and entered the career PeriodCIO --Let's call it the postCIOPerson. AfterCIOMost
"At the age of 35, your technical career is over ." This statement has been recognized by many people in the IT industry, and many IT people worry about their future. In fact, from another perspective, the end of a technical career means the
In recent years, the talent market in China has been oversupply, and the employment of college students has become a common concern in the society. Some people joked that "Graduation is equal to unemployment ". For this phenomenon, the most
Question: At present many young people are under the pressure of life, feel that their wages to make ends meet, looking at the side to do it's friends income all over million, even if the programmer is to eat "youth rice", but also want to go to do
Symbian OS application development-the story of SMS (1) favoritesAbstract: Short Message Service (SMS) is part of the GSM specification. Symbian OS SMS implements ETSI GSM 03.40 v7.4.0 technical based on SMS specifications. (This specification can be downloaded from the http://www.etsi.org) because our main task is to read, create, modify, delete and other operations, so the focus of this article on these operations, at the end of the article, we will also briefly talk about sending SMS messages
Summary: SMS (short message service) is part of the GSM specification. Symbian OS SMS implements ETSI GSM 03.40 v7.4.0 technical based on SMS specifications. (This specification can be downloaded from the http://www.etsi.org) because our main task is to read, create, modify, delete and other operations, so the focus of this article on these operations, at the end of the article, we will also briefly talk about sending SMS messages.
First, as in previous articles, we will briefly introduce sever
character. This encoding is similar to HEX Encoding, but it is more complex than HEX Encoding, but it is still reversible. It is characterized by an increase of 40% compared with the size of the original string. For details about this encryption method, refer to network transmission protocol-Base64. It doesn't matter if you don't understand it. I will provide a Base64 encryption and decryption tool at the end of the article. Now, proceed to the topic. When Google chooses to inject a keyword, th
getMacAddress(){ 2 String result = ""; 3 WifiManager wifiManager = (WifiManager) getSystemService(Context.WIFI_SERVICE); 4 WifiInfo wifiInfo = wifiManager.getConnectionInfo(); 5 result = wifiInfo.getMacAddress(); 6 Log.i(TAG, "macAdd:" + result); 7 return result; 8 }
The MAC address is relatively easy and can be obtained directly through WifiManager.
4. IMEI, IESI, and mobile phone model:
Java code:
1 private
getMacAddress(){ 2 String result = ""; 3 WifiManager wifiManager = (WifiManager) getSystemService(Context.WIFI_SERVICE); 4 WifiInfo wifiInfo = wifiManager.getConnectionInfo(); 5 result = wifiInfo.getMacAddress(); 6 Log.i(TAG, "macAdd:" + result); 7 return result; 8 }
The MAC address is relatively easy and can be obtained directly through wifimanager.
4. IMEI, iesi, and mobile phone model:
Java code:
1 private
: arrayOfString ){
Log. I (str2, num + "\ t ");
}
Initial_memory = Integer. valueOf (arrayOfString [1]). intValue () * 1024; // obtain the total system memory, measured in KB, multiplied by 1024 to Byte
LocalBufferedReader. close ();
} Catch (IOException e ){
}
Return Formatter. formatFileSize (getBaseContext (), initial_memory); // convert Byte to KB or MB, and normalize the memory size.
}
/**
* Screen width and height
* @ Return
*/
Public String getHeightAndWidth (){
Int wi
Http://blog.csdn.net/mickeyfirst/archive/2008/11/07/3247597.aspx
The following table summarises the UID usage for the common system-defined polymorphic DLLs:
Description
Usual Extension
Uid2
Uid3 required?
Application
App
KUidAppInapadef.h
Yes
Animation
Ani
KWservAnimDllUidInw32adll.h
No
Control Panel applet
CTL
KUidSystem
1. When writing a VBA function, if the function returns a value, it is written as follows:
'The actual number of rows for obtaining real dataPublic Function GetMaxRow () as integerFor I = MinRow To maxrow' loop the smallest row To the largest rowFor j = MinCol To maxcol' loop minimum column To maximum ColumnIf Trim (Cells (I, j). Value) ExitElse' if each value in this row is empty and until the value in the last column is empty, this action is null.Data after If j = MaxCol then' is considered i
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.