点击OK以向列表添加查询语句。
查询语句不会检查输入是否有效。
按照向导中的步骤构造正确的查询语句。
Follow the wizard steps to construct the correct query statement.
清单10展示了初始查询语句及其优化版本。
Listing 10 shows shows the original query statement and its optimized version.
此外,它将更新查询语句返回的结果集结构。
In addition, it will update the result set structure returned by the query.
在您测试编排之前,需要修改数据库查询语句。
Before you can test the orchestration, you have to adjust the database query.
如果你愿意,可以改掉下面的SQL查询语句。
在本书中,我们只用最简单的查询语句。
SQL查询最重要的元素是查询语句。
The most important element of the SQL query is the Select statement. The rules for Select statements are as follows.
这就是延迟加载,即尽可能长的延迟查询语句的执行。
This is lazy loading, or deferring the query as long as possible.
在这种情况下,使用自己指定的查询语句并填充才是明智之举。
In this particular situation, it makes sense for you to use the same table and fill it with a more specific query.
攻击者将其恶意输入注入到sql语句中,以修改查询语句的逻辑。
The attacker injects his malicious inputs to the SQL statement to change the query's logic.
要根据前面创建的XML的关系视图创建报告,输入下面的查询语句。
To create a report based on the relational view of the XML created previously, enter the following query statement.
通常,需要从一组已有的数据库查询语句(SQL)实现应用程序构建。
It is often the case that the process of building an application originates from having a set of database query statements (i.e. SQL).
上面的查询语句返回与tax1120view视图所含内容相同的信息。
The query statement above returns the same information as contained in the TAX1120VIEW view.
就像你看到的,上面的代码用三段字串组成了一个完整的SQL查询语句。
As you can see, the above code combines three tokens to generate a complete SQL query.
最后,配置连接器,编写一个SQL查询语句来将客房预订信息提交给数据库。
Finally, configure a connector and write an SQL query to submit the room-booking information to the database.
如下例所示,在此情况下,查询语句获得用户的名称和电子邮件地址。
In this scenario a query gets the name and e-email address from a user, as in the following example.
如您所见,黑客将恶意代码作为其userid输入,修改了查询语句的逻辑。
As you can see, the hacker changes the query's logic by entering the malicious code as his userid.
where和其他表达查询的操作数并不会真正引起查询语句被执行。
Where and other operands that express the query do not actually cause the query to execute.
任何熟悉sql的人都不会反对这很简单。剩下的就是这些代码了。先看看查询语句。
For the rest of us, here's the code that does the trick. First, the query.
可以全限定每个对象引用的名称,这能完全避免你的查询语句中存在的二义性。
Fully qualify Name; this will fully qualify each object reference, this disambiguates the your query statements completely.
当出现提示时,您可以直接键入查询语句或者使用向导帮助您创建一个查询语句。
When prompted, you can type in your query statement directly or use the wizards to help you create one.
“如果我单独分析每个查询语句,我将需要数百次分析和调优过程,而不是一次,”他说。
“If we analyzed each query statement individually, it would require hundreds of analysis and tuning procedures, versus one,” he says.
CommandEditor提供了体验各种查询语句并且可以立刻查看结果的简单方法。
The Command Editor provides a simple way to experiment with various query statements and see the results right away.
下一部分将介绍weblogic-ql元素到 ejb-ql 元素的查询语句映射。
The next sections show the mapping of query statements from weblogic-ql element to ejb-ql element.
这通过在 WHERE 语句中使用一个 cmp 字段来输入有效的EJBQL查询语句。
This will enter a valid EJBQL query with one cmp-field used in the WHERE predicate.
这是Coldfusion中使用的标签,用于将查询语句或sql语句传递给数据源。
This is the tag used in Coldfusion to pass queries or SQL statements to the data source.
在本例中,我们使用XRT表示法,它是将查询语句与XSL转换捆绑在一起的XSL的松散扩充。
In our example, we use the XRT notation, which is a loose extension of XSL that ties together query statements with an XSL transformation.
在本例中,我们使用XRT表示法,它是将查询语句与XSL转换捆绑在一起的XSL的松散扩充。
In our example, we use the XRT notation, which is a loose extension of XSL that ties together query statements with an XSL transformation.
应用推荐