Ò׽ؽØͼÈí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB
ÈÈÃűêÇ©£º c c# c++ asp asp.net linux php jsp java vb Python Ruby mysql sql access Sqlite sqlserver delphi javascript Oracle ajax wap mssql html css flash flex dreamweaver xml
 ×îÐÂÎÄÕ : access

ACCESS¶¨Ê±Ô¶³Ì±¸·Ý

ACCESSÔ¶³Ì±¸·ÝÒ»Ö±ÊǸöÁîÈËÍ·ÌÛµÄÎÊÌâ ¿´µ½Ò»¸ö²»´íµÄ±¸·Ý·½·¨ ·ÖÏíÏ£º
Ô­ÎĵØÖ·£ºhttp://www.cnblogs.com/catcat811/archive/2009/12/31/1637186.html
ÍøÕ¾ÓÖ¹ØÁË~~~¹ØµÃºÜͻȻ£¬Êý¾ÝÒ²À´²»¼°±¸·Ý¡£ÒòΪ¹«Ë¾Óиö²Ö¿âµÄϵͳÔÚ×âÓ÷þÎñÆ÷ÉÏ£¬Èç¹ûÍ£Á˾͵ÃÖØеã²Ö£¬ÄÇÊǺÜÀÛÈ˵ÄÊ¡£×î½üÍøվʱ³£¹Ø£¬ÕæÈÃÈËÍ·Í´¡£ÎªÁ˱ÜÃâÏ´ÎÓÖ±»¹ØÄò»µ½Êý¾Ý£¬ÐèҪʵÏÖÿÌìÔ¶³ÌÊý¾Ý±¸·Ý¡£¿ÉÊDzֿâϵͳÓõÄÊÇACCESS£¬Ã¿ÌìÈ¥±¸·ÝÏÂÀ´ºÜÀÛÈË£¬ËùÒÔÏëÓÃ×Ô¶¯±¸·ÝµÄ·½·¨¡£ 
 ·½·¨ºÜ¼òµ¥£¬ÏȸøÊý¾Ý¿âλÖÿª¸öFTP£¬ÈÃÔ¶³Ì»úÆ÷×Ô¶¯Á¬FTP°ÑÊý¾Ý¿âÏÂÔØ£¬ÏÂÔØ»ØÀ´ÒÔºó¾Í¿ÉÒÔ½øÐÐÒƶ¯»ò¸ÄÃû¡£windowsÏÂÓиöftpµÄÃüÁîÐгÌÐò£¬¾Í¿ÉÒÔʵÏÖFTPÁ¬½Ó£¬¶øÇÒËü¿ÉÒÔͨ¹ýÔËÐÐÎļþ½Å±¾µÄ·½Ê½×Ô¶¯Ö´ÐÐFTPÖ¸ÁÔÙÅäºÏWINDOWSµÄÈÎÎñ¼Æ»®³ÌÐòʵÏÖ¶¨Ê±ÔËÐоͿÉÒÔ¡£
ftp.txtÄÚÈÝÈçÏÂ
open www.example.com
̞
ÃÜÂë
binary
get data.mdb
bye
exit 
ftp.bat ÄÚÈÝÈçÏÂ
ftp -s:ftp.txt 
Á½¸öÎļþ·ÅÔÚͬһ¸öĿ¼£¬Ö®ºóÓÃÈÎÎñ¼Æ»®³ÌÐòÉ趨ÿÌìÔËÐÐftp.bat¾Í¿ÉÒÔÁË¡£Êý¾Ý¿âÎļþ»á·ÅÔÚftp.batµÄËùÔÚĿ¼¡£ ......

php Á¬½ÓaccessµÄ´úÂë

<?php
$connstr="DRIVER={Microsoft Access Driver (*.mdb)}; DBQ=" . realpath("data.mdb");
$connid=odbc_connect($connstr,"","",SQL_CUR_USE_ODBC);
$issuetime=date("Y-m-d H:i:s");
$sql="insert into test values("","",...)";
$result=odbc_exec($connid,$sql);
if($result) echo "successful";
else echo "failed";
?>
[/php]
accessÊý¾Ý¿âÃûΪdata.mdb,ÀïÃæÓÐÒ»¸öÊý¾Ý±ítest,´úÂëÔËÐгɹ¦£¬Ï£Íû¶ÔҪʹÓÃPHP+Access×öphp³ÌÐòµÄÈËÓÐËù°ïÖú ......

php Á¬½ÓaccessµÄ´úÂë

<?php
$connstr="DRIVER={Microsoft Access Driver (*.mdb)}; DBQ=" . realpath("data.mdb");
$connid=odbc_connect($connstr,"","",SQL_CUR_USE_ODBC);
$issuetime=date("Y-m-d H:i:s");
$sql="insert into test values("","",...)";
$result=odbc_exec($connid,$sql);
if($result) echo "successful";
else echo "failed";
?>
[/php]
accessÊý¾Ý¿âÃûΪdata.mdb,ÀïÃæÓÐÒ»¸öÊý¾Ý±ítest,´úÂëÔËÐгɹ¦£¬Ï£Íû¶ÔҪʹÓÃPHP+Access×öphp³ÌÐòµÄÈËÓÐËù°ïÖú ......

Android: Requesting root access in your app

תÌû£ºhttp://www.stealthcopter.com/blog/2010/01/android-requesting-root-access-in-your-app/
This snippet shows how root access can be requested inside an application in order to write a file into a place we do not have permission to access usually. Requesting root access will only work if your phone allows it, or it has been ‘rooted’ (hacked to allow superuser permissions).
view plaincopy to clipboardprint?
Process p;   
try {   
   // Preform su to get root privledges   
   p = Runtime.getRuntime().exec("su");    
  
   // Attempt to write a file to a root-only   
   DataOutputStream os = new DataOutputStream(p.getOutputStream());   
   os.writeBytes("echo \"Do I have root?\" >/s ......

¹ØÓÚAccessºÍExcelµÄÁ¬½Ó×Ö·û´®

1.Á¬½ÓAccessµÄÁ¬½Ó×Ö·û´®
string strConnect = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" + @FileName;
2.Á¬½ÓExcel
string strExcel = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source= " + @FileName + ";Extended Properties=Excel 8.0;"; ......

aspÁ¬½ÓaccessÊý¾ÝÀý×Ó

<%Dim connstrconnstr="Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & Server.MapPath("Stu.mdb")
Set bb = Server.CreateObject("ADODB.Connection")
bb.Open connstr%>
<html>
<head>
<meta http-equiv="content-Language" content="zh-cn" />
<meta http-equiv="Content-Type" content="text/html; charset=gb2312" />
<title>Asp+Access¶ÁÈ¡Êý¾Ý¿â</title>
</head>
<body>
<%Set rs = Server.CreateObject("ADODB.Recordset")
rs.open "select * from StuInfo",bb
if rs.eof and rs.bof then
response.Write "Êý¾Ý¿âÖÐûÓÐÊý¾Ý"
response.End()
end if
response.Write rs("Name")response.Write rs("Sex")
%>
</body>
</html> ......

aspÁ¬½ÓaccessÊý¾ÝÀý×Ó

<%Dim connstrconnstr="Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & Server.MapPath("Stu.mdb")
Set bb = Server.CreateObject("ADODB.Connection")
bb.Open connstr%>
<html>
<head>
<meta http-equiv="content-Language" content="zh-cn" />
<meta http-equiv="Content-Type" content="text/html; charset=gb2312" />
<title>Asp+Access¶ÁÈ¡Êý¾Ý¿â</title>
</head>
<body>
<%Set rs = Server.CreateObject("ADODB.Recordset")
rs.open "select * from StuInfo",bb
if rs.eof and rs.bof then
response.Write "Êý¾Ý¿âÖÐûÓÐÊý¾Ý"
response.End()
end if
response.Write rs("Name")response.Write rs("Sex")
%>
</body>
</html> ......

½«accessµ¼ÈëSQL server £¨×ª£©

ÊìϤSQL SERVER 2000µÄÊý¾Ý¿â¹ÜÀíÔ±¶¼ÖªµÀ£¬ÆäDTS¿ÉÒÔ½øÐÐÊý¾ÝµÄµ¼Èëµ¼³ö£¬Æäʵ£¬ÎÒÃÇÒ²¿ÉÒÔʹÓÃTransact-SQLÓï¾ä½øÐе¼Èëµ¼³ö²Ù×÷¡£ÔÚ Transact-SQLÓï¾äÖУ¬ÎÒÃÇÖ÷ҪʹÓÃOpenDataSourceº¯Êý¡¢OPENROWSET º¯Êý£¬¹ØÓÚº¯ÊýµÄÏêϸ˵Ã÷£¬Çë²Î¿¼SQLÁª»ú°ïÖú¡£ÀûÓÃÏÂÊö·½·¨£¬¿ÉÒÔÊ®·ÖÈÝÒ×µØʵÏÖSQL SERVER¡¢ACCESS¡¢EXCELÊý¾Ýת»»£¬Ïêϸ˵Ã÷ÈçÏ£º
Ò»¡¢SQL SERVER ºÍACCESSµÄÊý¾Ýµ¼Èëµ¼³ö
³£¹æµÄÊý¾Ýµ¼Èëµ¼³ö£º
ʹÓÃDTSÏòµ¼Ç¨ÒÆÄãµÄAccessÊý¾Ýµ½SQL Server£¬Äã¿ÉÒÔʹÓÃÕâЩ²½Öè:
¡¡¡¡¡ð1ÔÚSQL SERVERÆóÒµ¹ÜÀíÆ÷ÖеÄTools£¨¹¤¾ß£©²Ëµ¥ÉÏ£¬Ñ¡ÔñData Transformation
¡¡¡¡¡ð2Services£¨Êý¾Ýת»»·þÎñ£©£¬È»ºóÑ¡Ôñ  czdImport Data£¨µ¼ÈëÊý¾Ý£©¡£
¡¡¡¡¡ð3ÔÚChoose a Data Source£¨Ñ¡ÔñÊý¾ÝÔ´£©¶Ô»°¿òÖÐÑ¡ÔñMicrosoft Access as the Source£¬È»ºó¼üÈëÄãµÄ.mdbÊý¾Ý¿â(.mdbÎļþÀ©Õ¹Ãû)µÄÎļþÃû»òͨ¹ýä¯ÀÀÑ°ÕÒ¸ÃÎļþ¡£
¡¡¡¡¡ð4ÔÚChoose a Destination£¨Ñ¡ÔñÄ¿±ê£©¶Ô»°¿òÖУ¬Ñ¡ÔñMicrosoft OLE¡¡DB Prov ider for SQL¡¡Server£¬Ñ¡ÔñÊý¾Ý¿â·þÎ ......

½«accessµ¼ÈëSQL server £¨×ª£©

ÊìϤSQL SERVER 2000µÄÊý¾Ý¿â¹ÜÀíÔ±¶¼ÖªµÀ£¬ÆäDTS¿ÉÒÔ½øÐÐÊý¾ÝµÄµ¼Èëµ¼³ö£¬Æäʵ£¬ÎÒÃÇÒ²¿ÉÒÔʹÓÃTransact-SQLÓï¾ä½øÐе¼Èëµ¼³ö²Ù×÷¡£ÔÚ Transact-SQLÓï¾äÖУ¬ÎÒÃÇÖ÷ҪʹÓÃOpenDataSourceº¯Êý¡¢OPENROWSET º¯Êý£¬¹ØÓÚº¯ÊýµÄÏêϸ˵Ã÷£¬Çë²Î¿¼SQLÁª»ú°ïÖú¡£ÀûÓÃÏÂÊö·½·¨£¬¿ÉÒÔÊ®·ÖÈÝÒ×µØʵÏÖSQL SERVER¡¢ACCESS¡¢EXCELÊý¾Ýת»»£¬Ïêϸ˵Ã÷ÈçÏ£º
Ò»¡¢SQL SERVER ºÍACCESSµÄÊý¾Ýµ¼Èëµ¼³ö
³£¹æµÄÊý¾Ýµ¼Èëµ¼³ö£º
ʹÓÃDTSÏòµ¼Ç¨ÒÆÄãµÄAccessÊý¾Ýµ½SQL Server£¬Äã¿ÉÒÔʹÓÃÕâЩ²½Öè:
¡¡¡¡¡ð1ÔÚSQL SERVERÆóÒµ¹ÜÀíÆ÷ÖеÄTools£¨¹¤¾ß£©²Ëµ¥ÉÏ£¬Ñ¡ÔñData Transformation
¡¡¡¡¡ð2Services£¨Êý¾Ýת»»·þÎñ£©£¬È»ºóÑ¡Ôñ  czdImport Data£¨µ¼ÈëÊý¾Ý£©¡£
¡¡¡¡¡ð3ÔÚChoose a Data Source£¨Ñ¡ÔñÊý¾ÝÔ´£©¶Ô»°¿òÖÐÑ¡ÔñMicrosoft Access as the Source£¬È»ºó¼üÈëÄãµÄ.mdbÊý¾Ý¿â(.mdbÎļþÀ©Õ¹Ãû)µÄÎļþÃû»òͨ¹ýä¯ÀÀÑ°ÕÒ¸ÃÎļþ¡£
¡¡¡¡¡ð4ÔÚChoose a Destination£¨Ñ¡ÔñÄ¿±ê£©¶Ô»°¿òÖУ¬Ñ¡ÔñMicrosoft OLE¡¡DB Prov ider for SQL¡¡Server£¬Ñ¡ÔñÊý¾Ý¿â·þÎ ......
×ܼǼÊý:314; ×ÜÒ³Êý:53; ÿҳ6 Ìõ; Ê×Ò³ ÉÏÒ»Ò³ [1] 2 [3] [4] [5] [6] [7] [8] [9] [10]  ÏÂÒ»Ò³ βҳ
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØͼ | ¸ÓICP±¸09004571ºÅ