2012年计算机二级Access辅导笔记之建造Access表
第四章 建造 Access表 4.1 Access数据库表概述 一,表的组成 字段 字段的数据类型 字段的属性 字段的声名 二,表的视图 设计视图 数据表视图 数据透视表视图和数据透视图视图 1. 字段 字段名称要能够直接,清嚣张的反映信息内容 字段命名划定(同样适合于控件和
一,表的组成
字段
字段的数据类型
字段的属性
字段的声名
二,表的视图
设计视图
数据表视图
数据透视表视图和数据透视图视图
1. 字段
字段名称要能够直接,清嚣张的反映信息内容
字段命名划定(同样适合于控件和对象):
长度不能跨越64个西文字符(32个汉字);
不能包含句号".",感伤号"!",重音符号和方括号"";
不能以空格开首;
不能包含节制字符(0~31的ASCII值);;
最好确保字段名和Access中已有的属性和其他元素的名称不不异.
2. 字段的数据类型
合理选择字段的数据类型,可有用的提高数据库效率,并可避免一些错误的发生.
例:2002年5月14日
8
日期或时刻
日期(Date/Time)
货泉值除外
8
用来算术计较的数值
数字(Num)
注释,声名
65 536
长文本或文本与数字的组合
备注(Memo)
地址,电话号码,学号
255
文鼻橐恺字与文本组合,或不需要计较的数字
文本(Text)
备注
存储空间(字节)
合用规模
数据类型
表4-1 字段的数据类型
UNC,URL路径
64 000
用于超链接
超链接(Hyperlink)
例:Word,Excel文件
1GB
用于使用OLE和谈在其它轨范中建树的OLE对象
OLE对象(OLEObject)
是/否(Yes/No)
此类型字段不能更新

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The advantage of multithreading is that it can improve performance and resource utilization, especially for processing large amounts of data or performing time-consuming operations. It allows multiple tasks to be performed simultaneously, improving efficiency. However, too many threads can lead to performance degradation, so you need to carefully select the number of threads based on the number of CPU cores and task characteristics. In addition, multi-threaded programming involves challenges such as deadlock and race conditions, which need to be solved using synchronization mechanisms, and requires solid knowledge of concurrent programming, weighing the pros and cons and using them with caution.

SQL IF statements are used to conditionally execute SQL statements, with the syntax as: IF (condition) THEN {statement} ELSE {statement} END IF;. The condition can be any valid SQL expression, and if the condition is true, execute the THEN clause; if the condition is false, execute the ELSE clause. IF statements can be nested, allowing for more complex conditional checks.

The main reasons why you cannot log in to MySQL as root are permission problems, configuration file errors, password inconsistent, socket file problems, or firewall interception. The solution includes: check whether the bind-address parameter in the configuration file is configured correctly. Check whether the root user permissions have been modified or deleted and reset. Verify that the password is accurate, including case and special characters. Check socket file permission settings and paths. Check that the firewall blocks connections to the MySQL server.

How to avoid the third-party interface returning 403 error in the Node environment. When calling the third-party website interface using Node.js, you sometimes encounter the problem of returning 403 error. �...

Methods to solve the cross-domain problem of Vue Axios include: Configuring the CORS header on the server side using the Axios proxy using JSONP using WebSocket using the CORS plug-in

How to configure Zend in Apache? The steps to configure Zend Framework in an Apache Web Server are as follows: Install Zend Framework and extract it into the Web Server directory. Create a .htaccess file. Create the Zend application directory and add the index.php file. Configure the Zend application (application.ini). Restart the Apache Web server.

Get ComponentVerify in EasyWechat5.5...

Apache server is a powerful web server software that acts as a bridge between browsers and website servers. 1. It handles HTTP requests and returns web page content based on requests; 2. Modular design allows extended functions, such as support for SSL encryption and dynamic web pages; 3. Configuration files (such as virtual host configurations) need to be carefully set to avoid security vulnerabilities, and optimize performance parameters, such as thread count and timeout time, in order to build high-performance and secure web applications.
