当前位置:网站首页>Mysql--- query the top 5 students
Mysql--- query the top 5 students
2022-07-06 00:57:00 【The evening wind blows】
List of articles
demand : The query result is top 5 Students of
After getting the demand , First analyze the requirements , Find out the screening conditions
One 、Mysql Inquire about
1、 The most basic query
select * from table where name="panpan"
2、 Check before 5 name
stay mysql Top of the filtered data in , You can use keywords :limit
select * from table where name="panpan" limit 1
explain : The name in the query table is panpan The first record
3、 Under what conditions , The demand is to screen by achievements , You can use order by Sort filter
select * from table where order by grade
Two 、 Query application
Query after merging :
select * from score order by grade limit 5
explain : Query to score Exterior and interior grade , With grade Screening , Before extraction 5 Bar record
边栏推荐
- Convert binary search tree into cumulative tree (reverse middle order traversal)
- How to make your own robot
- Getting started with devkit
- Installation and use of esxi
- Live video source code, realize local storage of search history
- XML Configuration File
- The detailed page returns to the list and retains the original position of the scroll bar
- 直播系统代码,自定义软键盘样式:字母、数字、标点三种切换
- [groovy] compile time meta programming (compile time method interception | method interception in myasttransformation visit method)
- Zhuhai laboratory ventilation system construction and installation instructions
猜你喜欢

Browser reflow and redraw
![[groovy] compile time meta programming (compile time method interception | method interception in myasttransformation visit method)](/img/e4/a41fe26efe389351780b322917d721.jpg)
[groovy] compile time meta programming (compile time method interception | method interception in myasttransformation visit method)

Model analysis of establishment time and holding time

I'm interested in watching Tiktok live beyond concert

esxi的安装和使用

KDD 2022 | 脑电AI助力癫痫疾病诊断

Keepalive component cache does not take effect

MobileNet系列(5):使用pytorch搭建MobileNetV3并基于迁移学习训练

Set data real-time update during MDK debug

What is the most suitable book for programmers to engage in open source?
随机推荐
Logstash clear sincedb_ Path upload records and retransmit log data
Zhuhai laboratory ventilation system construction and installation instructions
面试必刷算法TOP101之回溯篇 TOP34
STM32按键消抖——入门状态机思维
curlpost-php
Cf:d. insert a progression [about the insert in the array + the nature of absolute value + greedy top-down]
Cf:h. maximum and [bit operation practice + K operations + maximum and]
Intensive learning weekly, issue 52: depth cuprl, distspectrl & double deep q-network
朝招金安全吗 会不会亏损本金
The detailed page returns to the list and retains the original position of the scroll bar
Questions about database: (5) query the barcode, location and reader number of each book in the inventory table
Starting from 1.5, build a micro Service Framework - call chain tracking traceid
如何制作自己的機器人
Gartner released the prediction of eight major network security trends from 2022 to 2023. Zero trust is the starting point and regulations cover a wider range
Cloud guide DNS, knowledge popularization and classroom notes
synchronized 和 ReentrantLock
Lone brave man
[groovy] compile time meta programming (compile time method interception | method interception in myasttransformation visit method)
Ubantu check cudnn and CUDA versions
程序员成长第九篇:真实项目中的注意事项