In SQL, use the NOT LIKE operator to query strings that are not equal to a specific pattern. Syntax: SELECT * FROM table_name WHERE column_name NOT LIKE '%pattern%'; where %pattern% is the pattern to be matched, and % represents the wildcard character.
How to use LIKE query in SQL is not equal
In SQL, we can use the LIKE operator to Matches strings containing a specific pattern. If we want to query for strings that are not equal to a specific pattern, we can use the NOT LIKE operator.
Syntax:
<code>SELECT * FROM table_name WHERE column_name NOT LIKE '%pattern%';</code>
Among them:
- ##table_name
is the name of the table to be queried.
- column_name
is the column name to match the pattern.
- %pattern%
is the pattern to match, where % represents a wildcard character, matching any number of characters.
customers table:
<code>SELECT * FROM customers WHERE name NOT LIKE '%John%';</code>This query will return all customers whose names do not contain "John" "John's" client. Note:
- If you want to match an exact string without using wildcard characters, use the equal sign (=) operator.
- If you want to match a string that does not start with a specific pattern, use NOT LIKE '%pattern'.
- If you want to match a string that does not end with a specific pattern, use NOT LIKE 'pattern%'.
The above is the detailed content of How to write like in sql is not equal to. For more information, please follow other related articles on the PHP Chinese website!

The article discusses horizontal and vertical data partitioning in SQL, focusing on their impact on performance and scalability. It compares benefits and considerations for choosing between them.

This article addresses deleting rows with foreign key constraints in relational databases. It details methods for handling constraint violations, including cascading deletes, restricting deletes, and setting nulls. The article emphasizes best pract

The article explains how to use SQL aggregate functions (SUM, AVG, COUNT, MIN, MAX) to summarize data, detailing their uses and differences, and how to combine them in queries.Character count: 159

The article discusses security risks of dynamic SQL, focusing on SQL injection, and provides mitigation strategies like using parameterized queries and input validation.

The article discusses SQL transaction isolation levels: READ UNCOMMITTED, READ COMMITTED, REPEATABLE READ, and SERIALIZABLE. It examines their impact on data consistency and performance, noting that higher isolation ensures greater consistency but ma

The article discusses the ACID properties (Atomicity, Consistency, Isolation, Durability) in SQL transactions, crucial for maintaining data integrity and reliability.

This article details effective testing strategies for SQL DELETE operations. It emphasizes verifying correct row deletion via pre- and post-deletion data comparisons, row counts, and negative testing. Best practices, including backups, transaction

This article compares SQL's DELETE and TRUNCATE commands. DELETE removes rows individually, allowing conditional removal and transaction rollback. TRUNCATE is faster, removing all rows at once, but lacks rollback capability. Performance and data re


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.
