No cache version.


Caching disabled. Default setting for this page:enabled (code DEF204)
If the display is too slow, you can disable the user mode to view the cached version.

Rechercher dans le manuel MySQL

Displaying 1 to 10 of 200 total results
https://dev.mysql.com/numeric-type-overview.html
For additional information about properties and storage requirements of the numeric types, see Section 11.2, “Numeric Types”, and Section 11.8, “Data Type Storage Requirements”. Display width is unrelated to the range of values a type can ...
https://dev.mysql.com/mysql-cluster-replication-conflict-resolution.html
When using a replication setup involving multiple masters (including circular replication), it is possible that different masters may try to update the same row on the slave with different data. Conflict resolution in NDB Cluster Replication ...
https://dev.mysql.com/audit-log-filter-definitions.html
For information about using JSON data in MySQL, see Section 11.6, “The JSON Data Type”. Filter definitions have this form, where actions indicates how filtering takes place: { "filter": actions } The following discussion describes permitted ...
https://dev.mysql.com/bit-functions.html
(The BIT_AND(), BIT_OR(), and BIT_XOR() aggregate functions are described in Section 12.20.1, “Aggregate (GROUP BY) Function Descriptions”.) Prior to MySQL 8.0, bit functions and operators required BIGINT (64-bit integer) arguments and returned ...
https://dev.mysql.com/c-api-prepared-statement-data-structures.html
Prepared statements use several data structures: To obtain a statement handler, pass a MYSQL connection handler to mysql_stmt_init(), which returns a pointer to a MYSQL_STMT data structure. To specify the statement to prepare, pass the MYSQL_STMT ...
https://dev.mysql.com/writing-authentication-plugins.html
MySQL supports pluggable authentication, in which plugins are invoked to authenticate client connections. Authentication plugins enable the use of authentication methods other than the built-in method of passwords stored in the mysql.user system ...
https://dev.mysql.com/c-api-data-structures.html
This section describes C API data structures other than those used for prepared statements, the asychronous interface, or the replication stream interface. For information about those, see Section 28.7.9, “C API Prepared Statement Data ...
https://dev.mysql.com/audit-log-file-formats.html
The MySQL server calls the audit log plugin to write an audit record to its log file whenever an auditable event occurs. Typically the first audit record written after plugin startup contains the server description and startup options. Elements ...
https://dev.mysql.com/plugin-data-structures.html
A plugin library file includes descriptor information to indicate what plugins it contains. If the plugin library contains any server plugins, it must include the following descriptor information: A library descriptor indicates the general server ...
https://dev.mysql.com/mysql-cluster-replication-schema.html
Replication in NDB Cluster makes use of a number of dedicated tables in the mysql database on each MySQL Server instance acting as an SQL node in both the cluster being replicated and the replication slave (whether the slave is a single server or a ...
Displaying 1 to 10 of 200 total results

Find a PHP function

Document created the 26/06/2006, last modified the 26/10/2018
Source of the printed document:https://www.gaudry.be/en/mysql-rf-fct-unsigned.html

The infobrol is a personal site whose content is my sole responsibility. The text is available under CreativeCommons license (BY-NC-SA). More info on the terms of use and the author.

References

  1. View the html document Language of the document:en Manuel MySQL : https://dev.mysql.com/

These references and links indicate documents consulted during the writing of this page, or which may provide additional information, but the authors of these sources can not be held responsible for the content of this page.
The author This site is solely responsible for the way in which the various concepts, and the freedoms that are taken with the reference works, are presented here. Remember that you must cross multiple source information to reduce the risk of errors.

Contents Haut