当前位置:网站首页>What functions does MySQL have? Don't look everywhere. Just look at this.
What functions does MySQL have? Don't look everywhere. Just look at this.
2022-07-28 11:23:00 【51CTO】

Format function FPRMAT(x,n)
format(x,n) The digital x format , And keep the decimal point after... In the way of rounding n position , The result is returned as a string .
If n by 0, Then the return result function does not contain decimal part .
Numbers in different base numbers are converted to each other
conv(n, from_base, to_base) This function can convert between different base numbers . For example, will 16 Conversion of decimal digits to 2 Base number , Or 2 Conversion of decimal digits to 10 It's all right .
The return value is a number n String representation of , from from_base The base number is converted to to_base Base number . If any of the parameters is null Words , So the return value is null.
IP Address and number conversion function
inet_auto(expr) Give a dot address representation of the network address as a string , Returns an integer representing the value of the address . The address can be 4 perhaps 8bit Address .
conversely , We can also use inet_ntoa Function converts a numeric network address to a string network point address , To look down :
therefore , From above ,inet_ntoa and inet_aton They're inverse functions to each other .
Lock function and unlock function
get_lock(str, timeout) Try to use a string str Get a lock for a given name , The timeout is timeout second . If you succeed in getting the lock , Then return to 1, If the operation times out , Then return to 0; Once an error occurs , Then return to null.
release_lock(str) Untie the quilt get_lock() Acquired 、 Use string str Lock named lock . If the lock is unlocked , Then return to 1, If the thread has not created a lock , Then return to 0( The lock is not unlocked at this time ); If the named lock does not exist , Then return to null. If this lock has never been get_lock() Call to get , Or the lock has been untied in advance , Then the lock does not exist .
is_free_lock(str) Check that the name is str Whether the lock can be used , If this lock can be used , Then return to 1( No one uses this lock ); If this lock is being used , Then return to 0; If something goes wrong , Then return to null( Like incorrect parameters ).
if_used_lock(str) Check that the name is str Is your lock being used , If this is locked , Returns the connection identifier of the client using the lock , Otherwise , Just go back to null.
get_lock('yunweijia', 15): The return result is 1, Description successfully got a name of ‘yunweijia’ Lock of , Duration is 15 second ;
is_used_lock('yunweijia'): The return result is the current connection id, The name is yunweijia The lock of is being used ;
is_free_lock('yunweijia'): The return is 0, The description name is yunweijia The lock of is being used ;
release_lock('yunweijia'): The return value is 1, It indicates that the unlocking is successful .
Reset the function that performs the specified operation
benchmark(count, expr) Function repetition count Number of execution expressions expr.
He can calculate with a computer mysql Speed of processing expressions . The result value is generally 0(0 It just means that the processing process is fast , Not without time ). Another function is that it can be used in mysql The execution time of the client internal report statement .
for instance :
First we use sha Function to encrypt a password , as follows :
You can see from above , This article sql The execution time is 0.00 sec, Then we use benchmark function , Repeat this command 50000 Time , Look at the running time ;
As you can see from the above results , It actually runs 0.03 second .
Functions that change the character set
convert(...using...): with using Of convert() Function is used to convert data between different character sets .
See from above , The default character set is utf8mb3, adopt convert The string yunweijia The default character set of is changed to latin1.
Functions that change data types
cast(x, as type) and convert(x, type) Function converts a value of one type to a value of another type , Convertible type There are the following :
- binary
- char(n)
- date
- time
- datetime
- decimal
- signed
- unsigned
You can see from above ,select cast(1000 as char(3)) Set integer data 1000, Convert to a string type with two display widths , The result is 100;
convert('2022-07-18 09:09:00', time) take datetime The value of type is converted to time Type values , The result is 09:09:00.
thus , In this paper, the end .
For more information, go to VX official account “ Operation and maintenance home ” , Get the latest article .
------ “ Operation and maintenance home ” ------
------ “ Operation and maintenance home ” ------
------ “ Operation and maintenance home ” ------
Linwu County operation and maintenance engineer training , Wenzhou operation and maintenance engineer , Accessible oa Implementation O & M engineer , Interview with call center operation and maintenance engineer
tencent idc shipment Interview with maintenance engineer , O & M Engineer samba, What is the industry of operation and maintenance engineers ,
Origin of operation and maintenance engineer , Operation and maintenance engineers are easy to find , Operation and maintenance Engineer access , Self study of operation and maintenance engineers is feasible
边栏推荐
- ripro9.0修正升级版+WP两款美化包+稀有插件
- Table data processing software, what else besides excel?
- c语言链表的使用
- DHCP experiment demonstration (Huawei switch device configuration)
- Ec20/ec25 4G module at instruction development summary
- Learn how to do e-commerce data analysis (with operation analysis index framework)
- Jianzhi offer 09. realize queue with two stacks
- Eslint, eslint Chinese document
- 18 diagrams, intuitive understanding of neural networks, manifolds and topologies
- BC35 NB模块AT指令开发总结
猜你喜欢

DHCP experiment demonstration (Huawei switch device configuration)

Zero code | easily realize data warehouse modeling and build Bi Kanban

Preliminary understanding of float

Learn to use MySQL explain to execute the plan, and SQL performance tuning is no longer difficult

Two dimensional prefix and

Learn how to do e-commerce data analysis (with operation analysis index framework)
![[MySQL from introduction to proficiency] [advanced chapter] (IX) precautions for InnoDB's b+ tree index](/img/dc/2c11852929cc2ad4a2e44b87e6f812.png)
[MySQL from introduction to proficiency] [advanced chapter] (IX) precautions for InnoDB's b+ tree index

好用到爆!IDEA 版 Postman 面世了,功能真心强大

分体式测斜探头安装要点及注意事项

「学习笔记」树状数组
随机推荐
Installation points and precautions of split angle probe
用 ZEGO Avatar 做一个虚拟人|虚拟主播直播解决方案
Zero code | easily realize data warehouse modeling and build Bi Kanban
I use the applet container to improve the efficiency of mobile R & D by 5 times!
【C语言】的%*d、%.*s等详解:「建议收藏」
Machine learning strong foundation plan 0-5: why is the essence of learning generalization ability?
A solution to the problem that ThinkPad fingerprint verification cannot be used in win7
STM32驱动ST7701S芯片(vⅰV0手机换屏价)
Here is a super practical excel shortcut set (common + summary of eight categories)
Inventory: exciting data visualization chart
Tree shaking and DCE
Inventory: 144 free learning websites, the most complete collection of resources in the whole network
BOM part attributes and understanding
Cortex-M内核管理全局中断的三种方式
Fhwy workday schedule
Relevant knowledge points of hash table
[MySQL from introduction to proficiency] [advanced chapter] (IX) precautions for InnoDB's b+ tree index
Jianzhi offer 09. realize queue with two stacks
Two point, three point, 01 point plan [bullet III]
What's the secret of creating a popular short video?