这张是产品表
红色圈起的部分是产品的栏目组ID
这张是产品栏目表
我现在的问题是:
我从前端通过GET传一个产品栏目表的ID,获取这个ID之后怎样判断产品表里面的栏目组ID 还有GET传过来的字段。
sql语句
谢谢各位求指点了
回复讨论(解决方案)
?取$n_id后
在?品?目表用??$n_id查找一下是否存在??,如果是,表示是?品?目表的id,然後可以??下面的事件了。
select * from ?品?目表 where nav_id=$n_id;
?取$n_id后
在?品?目表用??$n_id查找一下是否存在??,如果是,表示是?品?目表的id,然後可以??下面的事件了。
select * from ?品?目表 where nav_id=$n_id;
可能我表达不清
我举个例子好了,比如
我通过get传了一个n_id=10001 ,我想通过这个参数找到 产品表的pro_navid里面包含10001的数据
返回 产品表的蓝色圈起的两条数据
... find_in_set('n_id', pro_navid)
你 pro_navid 中的那些点不会是小数点吧?改成逗号
select * from 产品目录表 where nav_id like %$n_id% ;
刚刚那个会有问题!!!这样把: select * from 产品目录表 where nav_id like % ,$n_id,% ;
刚刚那个会有问题!!!这样把: select * from 产品目录表 where nav_id like % ,$n_id,% ;
好的我试试,谢谢了
$sqlstr = "select * from ?品表 where concat(',',pro_navid,',') like '%,".$n_id."%,';
... find_in_set('n_id', pro_navid)
你 pro_navid 中的那些点不会是小数点吧?改成逗号
是用逗号隔开的,我试试,谢谢了
$sqlstr = "select * from ?品表 where concat(',',pro_navid,',') like '%,".$n_id."%,'";
??才?。
$sqlstr = "select * from ?品表 where concat(',',pro_navid,',') like '%,".$n_id.",%'";
$sqlstr = "select * from ?品表 where concat(',',pro_navid,',') like '%,".$n_id."%,'";

Laravel simplifies handling temporary session data using its intuitive flash methods. This is perfect for displaying brief messages, alerts, or notifications within your application. Data persists only for the subsequent request by default: $request-

The PHP Client URL (cURL) extension is a powerful tool for developers, enabling seamless interaction with remote servers and REST APIs. By leveraging libcurl, a well-respected multi-protocol file transfer library, PHP cURL facilitates efficient execution of various network protocols, including HTTP, HTTPS, and FTP. This extension offers granular control over HTTP requests, supports multiple concurrent operations, and provides built-in security features.

Laravel provides concise HTTP response simulation syntax, simplifying HTTP interaction testing. This approach significantly reduces code redundancy while making your test simulation more intuitive. The basic implementation provides a variety of response type shortcuts: use Illuminate\Support\Facades\Http; Http::fake([ 'google.com' => 'Hello World', 'github.com' => ['foo' => 'bar'], 'forge.laravel.com' =>

Do you want to provide real-time, instant solutions to your customers' most pressing problems? Live chat lets you have real-time conversations with customers and resolve their problems instantly. It allows you to provide faster service to your custom

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

PHP logging is essential for monitoring and debugging web applications, as well as capturing critical events, errors, and runtime behavior. It provides valuable insights into system performance, helps identify issues, and supports faster troubleshoot

Laravel simplifies HTTP verb handling in incoming requests, streamlining diverse operation management within your applications. The method() and isMethod() methods efficiently identify and validate request types. This feature is crucial for building

The Storage::download method of the Laravel framework provides a concise API for safely handling file downloads while managing abstractions of file storage. Here is an example of using Storage::download() in the example controller:


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version
Recommended: Win version, supports code prompts!

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft
