search
HomeDatabaseMysql TutorialGetting Started with SQL Server 7.0 (7)

i. Declaring the cursor
In this step, you need to specify the properties of the cursor and the result set generated according to the requirements. There are two ways to specify a cursor.
Form 1 (ANSI 92)
DECLARE cursor_name [INSENSITIVE] [SCROLL] CURSOR
FOR select_statement
[FOR {READ ONLY | UPDATE][OF column_list]}]
Form 2
DECLARE cursor_name CURSOR
[LOCAL | GLOBAL]
[FORWARD_ONLY | SCROLL]
[STATIC | KEYSET | DYNAMIC]
[READ_ONLY | SCROLL_LOCKS | OPTIMISTIC]
FOR select_statement
[FOR {READ ONLY | UPDATE ][OF column_list]}]
INSENSITIVE keyword indicates that a temporary copy is to be created for the retrieved result set, and future data will be obtained from this temporary copy. If the data in the original base table changes during subsequent cursor processing, they will not be visible to the cursor. This insensitive cursor does not allow data changes. The
SCROLL keyword indicates that the cursor can scroll in any direction. All fetch options (first, last, next, relative, absolute) can be used in cursors. If this option is omitted, the cursor can only scroll forward (next).
Select_statement specifies the result set created by the SQL statement. The Transact SQL statements COMPUTE, COMPUTE BY, FOR BROWSE, and INTO are not allowed in the select statement of a cursor declaration.
READ ONLY indicates that data modification is not allowed in the cursor result set. The
UPDATE keyword indicates that the cursor's result set can be modified.
OF column_list specifies the columns in the result set that can be modified. By default (using the UPDATE keyword), all columns can be modified. The
LOCAL keyword indicates that the cursor is local and can only be used within the process in which it is declared. The
GLOBAL keyword makes the cursor globally visible to the entire connection. Global cursors are available anytime the connection is active. Only when the connection ends is the cursor no longer available.
FORWARD_ONLY specifies that the cursor can only scroll forward.
STATIC cursors are the same as INSENSITIVE cursors.
KEYSET specifies the order of selected rows. SQL Server will create a temporary keyword set from the result set. If modifications are made to non-keyword columns of the database, they are visible to the cursor. Because it is a fixed set of keywords, modifications to the keyword column or newly inserted columns are not visible.
DYNAMIC indicates that the cursor will reflect all modifications to the result set.
SCROLL_LOCK is to lock modification or deletion in order to ensure the success of cursor operations.
OPTIMISTIC indicates which modifications or deletions through the cursor will not succeed.
Note:
· If DISTINCT, UNION, and GROUP BY statements are used in the SELECT statement, and the selection contains an aggregate expression, the cursor will automatically be an INSENSITIVE cursor.
· If the base table does not have a unique index, the cursor is created as an INSENSITIVE cursor.
· If the SELECT statement contains ORDER BY, and the column being ORDER BY is not a unique row identifier, the DYNAMIC cursor will be converted into a KEYSET cursor. If the KEYSET cursor cannot be opened, it will be converted to an INSENSITIVE cursor. The same is true for cursors defined using SQL ANSI-92 syntax, but without the INSENSITIVE keyword.
II. Open the cursor
open the cursor is to create a result set. The cursor is defined through the DECLARE statement, but its actual execution is through the OPEN statement. The syntax is as follows:
OPEN { { [GLOBAL] cursor_name } | cursor_variable_name}
GLOBAL specifies a global cursor.
Cursor_name is the name of the open cursor.
Cursor_variable_name is the variable name of the referenced cursor. The variable should be of cursor type.
After the cursor is opened, the system variable @@cursor_rows can be used to detect the number of rows in the result set. When @@cursor_rows is a negative number, it means that the cursor is being migrated asynchronously, and its absolute value (if @@cursor_rows is -5, the absolute value is 5) is the number of rows in the current result set. Asynchronous cursors enable users to still access the results of a cursor while the cursor is completely migrated.
          iii.                                                                                                                                                                                                                                                                                   but ii. If the cursor is defined as scrollable (using the SCROLL keyword when declaring it), any row in the result set can be retrieved at any time. For non-scrolling cursors, fetch operations can only be performed on the row next to the current row. The result set can be retrieved from local variables. The syntax of the Fetch command is as follows:
FETCH [NEXT | PRIOR| FIRST | LAST | ABSOLUTE {n | @nvar} | RELATIVE {n | @nvar}]
FROM [GLOBAL] cursor_name} | cursor_variable_name}
[INTO @variable_name ][,...n]]
NEXT specifies to get the value from the next row of the current row.
PRIOR specifies taking the value from the previous row of the current row.
FIRST is the first row of the result set.
LAST is the last row of the result set.
ABSOLUTE n represents the nth row in the result set. The row number can also be propagated through a local variable. Line numbers start from 0, so you can't get any lines when n is 0.
RELATIVE n means that the row to be fetched is n rows before or n rows after the current row. If the value is a positive number, the row to be fetched is located n rows before the current row. If the value is negative, the row after the current row is returned.
INTO @cursor_variable_name represents the variable list where the cursor column value is stored. The number of variables in this list should be the same as the number of variables used by the select statement in the DECLARE statement. The data type of the variable should also be the same as the data type of the selected column. The value in the variable will be retained until the next time the FETCH statement is used.
Each FETCH execution is stored in the system variable @@fetch_status. If the FETCH is successful, @@fetch_status is set to 0. @@fetch_status of -1 indicates that part of the result set has been reached (for example, a row in the base table was deleted after the cursor was opened). @@fetch_status can be used to construct a cursor processing loop.
For example:
DECLARE @iname char(20), @fname char(20)
OPEN author_cur
FETCH FIRST FROM author_cur INTO @iname, @fname
WHILE @@fetch_status = 0
BEGIN
IF @fname = 'Albert'
PRINT “Found Albert Ringer”
ELSE
Print “Other Ringer”
FETCH NEXT FROM author_cur INTO @iname, @fname
END
                     iv. Close the cursor
CLOSE statement is used to close the cursor and release the result set. After the cursor is closed, no FETCH operation can be performed. If you still need to use the FETCH statement, you need to reopen the cursor. The grammar is as follows:
Close [Global] Cursor_name | Cursor_variable_name
V. Release the cursor
the cursor is no longer needed, to release the cursor. The DEALLOCATE statement releases locks on data structures and cursors. The syntax is as follows:
DEALLOCATE [GLOBAL] cursor_name | cursor_variable_name

A complete example of a cursor is given below:
USE master
GO
CREATE PROCEDURE sp_BuildIndexes
AS
DEC LARE @TableName sysname, @msg varchar(100), @cmd varchar(100)

DECLARE table_cur CURSOR FOR
SELECT name FROM sysobjects WHERE type='u'

OPEN table_cur
FETCH NEXT FROM table_cur INTO @TableName

WHILE @@fetch_status = 0
BEGIN
IF @@fetch_status = -2
CONTINUE
S ELECT @msg = “Building indexes for table”+@TableName+”…”
PRINT @msg
SELECT @cmd = "DBCC DBREINDEX ('"+@TableName+"')"
EXEC (@cmd)
PRINT " "
FETCH NEXT FROM table_cur INTO @TableName
END
DEALLOCATE table_cur
GO
The following script will execute sp_BuildIndexes
USE pubs
GO
EXEC ap_BuildIndexes
for the PUBS database. NOTE: The above is also an example of creating a user-defined system stored procedure.

Use temporary table
Temporary tables are tables created in TempDB. The names of temporary tables all start with "#". The scope of a temporary table is the connection that created the temporary table. Because temporary tables cannot be shared between two connections, the temporary table will be discarded once the connection is closed. If the temporary table is created within a stored procedure, the scope of the temporary table is within the stored procedure, or any stored procedure called by the stored procedure. If you need to share temporary tables between connections, you need to use global temporary tables. The global temporary table starts with the "##" symbol and will exist in the database until SQL Server is restarted. Once such a temporary table is created, all users can access it. Permissions cannot be specified explicitly on temporary tables. Temporary tables provide the ability to store intermediate results. Sometimes, temporary tables can also improve performance by breaking a complex query into two queries. This can be achieved by first storing the results of the first query in a temporary table and then using the temporary table in the second query. Temporary tables are recommended when a subset of a large table is used multiple times during an existing procedure. In this case, keeping a subset of the data in a temporary table for use in subsequent joins can greatly improve performance. Indexes can also be created on temporary tables.

The above is the content of Getting Started with SQL Server 7.0 (7). For more related content, please pay attention to the PHP Chinese website (www.php.cn)!


Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
SQL Server使用CROSS APPLY与OUTER APPLY实现连接查询SQL Server使用CROSS APPLY与OUTER APPLY实现连接查询Aug 26, 2022 pm 02:07 PM

本篇文章给大家带来了关于SQL的相关知识,其中主要介绍了SQL Server使用CROSS APPLY与OUTER APPLY实现连接查询的方法,文中通过示例代码介绍的非常详细,下面一起来看一下,希望对大家有帮助。

SQL Server解析/操作Json格式字段数据的方法实例SQL Server解析/操作Json格式字段数据的方法实例Aug 29, 2022 pm 12:00 PM

本篇文章给大家带来了关于SQL server的相关知识,其中主要介绍了SQL SERVER没有自带的解析json函数,需要自建一个函数(表值函数),下面介绍关于SQL Server解析/操作Json格式字段数据的相关资料,希望对大家有帮助。

聊聊优化sql中order By语句的方法聊聊优化sql中order By语句的方法Sep 27, 2022 pm 01:45 PM

如何优化sql中的orderBy语句?下面本篇文章给大家介绍一下优化sql中orderBy语句的方法,具有很好的参考价值,希望对大家有所帮助。

Monaco Editor如何实现SQL和Java代码提示?Monaco Editor如何实现SQL和Java代码提示?May 07, 2023 pm 10:13 PM

monacoeditor创建//创建和设置值if(!this.monacoEditor){this.monacoEditor=monaco.editor.create(this._node,{value:value||code,language:language,...options});this.monacoEditor.onDidChangeModelContent(e=>{constvalue=this.monacoEditor.getValue();//使value和其值保持一致i

一文搞懂SQL中的开窗函数一文搞懂SQL中的开窗函数Sep 02, 2022 pm 04:55 PM

本篇文章给大家带来了关于SQL server的相关知识,开窗函数也叫分析函数有两类,一类是聚合开窗函数,一类是排序开窗函数,下面这篇文章主要给大家介绍了关于SQL中开窗函数的相关资料,文中通过实例代码介绍的非常详细,需要的朋友可以参考下。

如何使用exp进行SQL报错注入如何使用exp进行SQL报错注入May 12, 2023 am 10:16 AM

0x01前言概述小编又在MySQL中发现了一个Double型数据溢出。当我们拿到MySQL里的函数时,小编比较感兴趣的是其中的数学函数,它们也应该包含一些数据类型来保存数值。所以小编就跑去测试看哪些函数会出现溢出错误。然后小编发现,当传递一个大于709的值时,函数exp()就会引起一个溢出错误。mysql>selectexp(709);+-----------------------+|exp(709)|+-----------------------+|8.218407461554972

springboot配置mybatis的sql执行超时时间怎么解决springboot配置mybatis的sql执行超时时间怎么解决May 15, 2023 pm 06:10 PM

当某些sql因为不知名原因堵塞时,为了不影响后台服务运行,想要给sql增加执行时间限制,超时后就抛异常,保证后台线程不会因为sql堵塞而堵塞。一、yml全局配置单数据源可以,多数据源时会失效二、java配置类配置成功抛出超时异常。importcom.alibaba.druid.pool.DruidDataSource;importcom.alibaba.druid.spring.boot.autoconfigure.DruidDataSourceBuilder;importorg.apache.

Monaco Editor怎么实现SQL和Java代码提示Monaco Editor怎么实现SQL和Java代码提示May 11, 2023 pm 05:31 PM

monacoeditor创建//创建和设置值if(!this.monacoEditor){this.monacoEditor=monaco.editor.create(this._node,{value:value||code,language:language,...options});this.monacoEditor.onDidChangeModelContent(e=>{constvalue=this.monacoEditor.getValue();//使value和其值保持一致i

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software