Tutorials to .com

Tutorials to .com » Database » Sqlserver » Microsoft SQL Server Tutorial

Microsoft SQL Server Tutorial Articles


341: SQLServer to use for the IIS Virtual Directory Management Utility
For SQL Server using the IIS Virtual Directory Management Utility In the use of HTTP access to Microsoft? SQL Server? 2000 database, you must install the appropriate virtual directory. Running Microsoft Internet Information Services (IIS) computer,...

342: SQLServer Database Performance Optimization
SQL Server Database Performance Optimization 1 Database Design ...

343: SQLServer to improve the performance of five methods (b)
SQL Server to improve the performance of five methods (b) LEFT JOIN and NULL to avoid Of course, there are many times when you need to use LEFT JOIN and NULL value. However, they do not apply in all cases. Construction to change the SQL query may ...

344: SQLServer to improve the performance of five methods (a)
SQL Server to improve the performance of five methods (a) Sometimes, in order to let applications run faster, all the work is done here and there to do some small adjustments. Ah, but the key is to determine how to adjust! Sooner or later you will ...

345: Database system on the anti-hacking technology
Database system on the anti-hacking technology 1. Preface 2. Network-level security technology 3. The host operating system-level security technology 4. Database management system-level security technology 5. Conclusion ...

346: PHP garbled MySQL4.1 resolve the issue of access
PHP access to MySQL 4.1 to solve garbage problem MySQL 4.1 from the beginning of the introduction of multi-language support is indeed great, but more than some other characteristics of the database system. However, I found in the course of testing ...

347: mysql string function
mysql string function Note: If the outcome is greater than the length of the server parameter max_allowed_packet, string-valued functions return NULL ASCII(str) Return string str left most of the ASCII character code values. If str is the empty st...

348: ORACLE account to use the default password of the system to enhance competence
ORACLE account to use the default password of the system to enhance competence In recent days, even to a host on a lap around the configuration of the host but still it is safe to hide a directory of a residual upfile.asp, the result of easy access...

349: Oracle database to maintain the excellent performance of -1
Oracle database to maintain the excellent performance of -1 First, partition Second, reconstruction index ...

350: The easiest way to backup MySql database
The easiest way to backup MySql database The use of MYSQL database backup, there are formal methods of database backup, the database server with the other have the same concept, but has it ever occurred, MySQL will be more simple to use backup meth...

351: Collection of Oracle experience
Collection of Oracle experience 1. Delete table space DROP TABLESPACE TableSpaceName [INCLUDING CONTENTS [AND DATAFILES]] 2. Delete User DROP USER User_Name CASCADE 3. Note the deletion of the table In the deletion of a table of all data shoul...

352: Oracle Data Safety Measures
Oracle Data Safety Measures With the popularity of computer and network development, the database is no longer a mere programmers those topics exclusively. Oracle database is its excellent performance, easy to operate and flexible characteristics o...

353: Installation Oracle9iRAC + AIX5.2 + HACMP5.1 good calendar
The installation of Oracle 9i RAC + AIX 5.2 + HACMP 5.1 good calendar screen.width-333)this.width=screen.width-333" border=0> January 1, 9:00 am, picked up from customers. Side of the room and found a construction site or, dust flying. The original...

354: Linuxx86 installed in OracleRAC10g
In the Linux x86 to install Oracle RAC 10g Red Hat Enterprise Linux 4 (RHEL4) Red Hat Enterprise Linux 3 (RHEL3) Red Hat Enterprise Linux 2.1 (RHEL2.1) Novell SUSE Linux Enterprise Server 9 Novell SUSE Linux Enterprise Server 8 If you are the ...

355: Use the cursor LServer2000
L Server 2000 to use the cursor open my_cursor declare @ name sysname fetch next from my_cursor into @ name while (@ @ fetch_status = 0) begin print the names of: + @ name fetch next from my_cursor into @ name end fetch first from my_cursor...

356: The restoration of physical methods to delete the database
The restoration of physical methods to delete the database The first step: using software to restore database files and log Software: Active @ UNDELETE is a powerful anti-remove software, you can restore your files and data, even if the document ha...

357: In Transact-SQL statement to indicate how to use the binary form of constant data?
In Transact-SQL statement to indicate how to use the binary form of constant data? In fact, Transcat-SQL has given us a solution and that is the constant binary format. 0x at the beginning of this format is followed by a number of hexadecimal digit...

358: The type of data does not match the index may lead to failure
The type of data does not match the index may lead to failure Briefly described as follows: Create Table Test ( c1 int not null, c2 money default 0, c3 varchar (20), constraint PK_Test primary key (c1)) go create index ind_c2_Test on Test (c...

359: Application of full-text search (3)
Application of full-text search (3) ...

360: Application of full-text search (2)
Application of full-text search (2) CONTAINS syntax in the WHERE clause, we usually use CONTAINS, like this: SELECT * FROM table_name WHERE CONTAINS (fullText_column, search contents). We have to learn through example, assume that table students, ...


Page 18 of 39
[1]   [2]   [3]   [4]   [5]   [6]   [7]   [8]   [9]   [10]   [11]   [12]   [13]   [14]   [15]   [16]   [17]   [18]   [19]   [20]   [21]   [22]   [23]   [24]   [25]   [26]   [27]   [28]   [29]   [30]   [31]   [32]   [33]   [34]   [35]   [36]   [37]   [38]   [39]