Firebird 2.5 Language Referenceyou Firebirders who have English as a second language, do consider translating some sections into your first language. 1.2.3. Contributors Direct Content • Dmitry Filippov (writer) • Alexander Karpeykin subset supported by Firebird gpre, the application which allows you to embed SQL constructs into your host programming language (C, C++, Pascal, Cobol, etc.) and preprocess those embedded constructs any text specified by the code writer, usually used to document how particular parts of the code work. The parser ignores the text of comments. Firebird supports two types of comments: block and in-line0 码力 | 521 页 | 2.30 MB | 1 年前3
firebird 40 language referencesubset supported by Firebird gpre, the application which allows you to embed SQL constructs into your host programming language (C, C++, Pascal, Cobol, etc.) and preprocess those embedded constructs any text specified by the code writer, usually used to document how particular parts of the code work. The parser ignores the text of comments. Firebird supports two types of comments: block and in-line ABS CEILING EXP FLOOR LN LOG LOG10 POWER SIGN SQRT The aggregate functions SUM, AVG, MAX and MIN work with DECFLOAT data, as do all the statistics aggregates (including but not limited to STDDEV or CORR)0 码力 | 778 页 | 3.43 MB | 1 年前3
Firebird 2 QuickStart...................................................................................... 11 Testing your installation .................................................................................... ................................................................................... 24 Protecting your data ............................................................................................ the Firebird documentation project. Important Before you read on, verify that this guide matches your Firebird version. This guide covers versions 2.0– 2.0.6 and 2.1–2.1.4. For all other Firebird versions0 码力 | 40 页 | 218.42 KB | 1 年前3
Firebird 2.1.5 Installation......................................... 29 Firebird 2 Migration & Installation v Customising Your Installation .................................................................................... do .................................................................................... 36 Testing your Linux installation .............................................................................. that you have previously taken care of. Changes to Note in V.2.1 Metadata Need to be Upgraded If your databases contain text BLOBs storing non-ASCII data then the backup/restore cycle is not enough to0 码力 | 46 页 | 217.89 KB | 1 年前3
firebird 5 quickstartguide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.4. Testing your installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 7. Protecting your data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . or submit a pull request fixing the issue. Before you read on, verify that this guide matches your Firebird version. This document covers Firebird 5. For all other Firebird versions, get the corresponding0 码力 | 49 页 | 396.21 KB | 1 年前3
Firebird 1.0 QuickStartprogram ...................................................................................... 7 Testing your installation .................................................................................... quick start with a Firebird binary kit. For the fine details of configuring and running your server and tuning your installation, please refer to Chapters 4-6 of the Using Firebird manual, distributed on IBPhoenix donated the guide to the Firebird Project. Important Before you read on, verify that your Firebird version matches this guide. This guide covers versions 1.0, 1.0.2 and 1. 0.3. If you run0 码力 | 26 页 | 179.05 KB | 1 年前3
firebird gbakalso result in a prompt for the password. Firebird 2.5 onwards. -M[ETA_DATA] This switch causes your data to be ignored and not backed up or restored. In a backup, only the database meta data are backed with a error code of zero. This method of calling gbak will make a backup of the database. If your database is large, this can take some time to complete and the backup file specified will be overwritten guarantee that the data will be usable though, so it is best to take other precautions to preserve your data. -L[IMBO] If you have a two-phase transaction (across two different databases) that failed0 码力 | 34 页 | 191.73 KB | 1 年前3
Firebird Null Guide: NULL behaviour and pitfalls in Firebird SQLexpressions that contain NULL or may resolve to NULL. If you only need a quick reference to refresh your memory, go to the summary at the end of the guide. So — what is it? In SQL, NULL is not a value This will be discussed later. 2.5. The NULL literal The ability to use NULL literals depends on your Firebird version. 2.5.1. Firebird 1.5 and below In Firebird 1.5 and below you can only use the literal and its value is never contained in the Number column, the result of the expression (and therefore your program flow) may still vary over time according to the absence or presence of NULLs in the column0 码力 | 69 页 | 479.63 KB | 1 年前3
firebird isql(isql), and instructions on how to use it to perform tasks within the database. This manual is a work in progress. It is subject to change and possible restructuring as new versions appear. 1.1. Audience provide the absolute file path if you have another relational database, besides Firebird, installed on your machine. Some affected distributions, such as Mint Linux — based on Ubuntu — have renamed Firebird’s Chapter 3. Invoking Isql If you do not have the Firebird bin directory on your path, then either go to the bin subdirectory of your Firebird installation and type isql (Windows) or ./isql (Linux) at the0 码力 | 76 页 | 369.92 KB | 1 年前3
firebird gfixISC_USER=sysdba C:\> set ISC_PASSWORD=masterkey This is very insecure as it allows anyone who can access your session the ability to perform DBA functions that you might not want to allow. -role role Supplies trusted authentication. If you have not defined the above environment variables, some commands will not work unless you supply -u[ser] and -pa[ssword] on the command line. For example: linux> gfix -validate and the users are able to continue processing data as normal and without loss. In the event that your main database file(s) become corrupted or unreadable, the DBA can activate Chapter 4. Shadow Files0 码力 | 44 页 | 247.13 KB | 1 年前3
共 26 条
- 1
- 2
- 3













