Introduction to access common fields
The following is a description of common fields in the access database:
BINARY - each character occupies 1 byte. Any type of data can be stored in this type in the field. No data conversion (for example, to text) is performed. How data is input into a binary field is displayed as output
BIT - 1 byte with values of Yes and No, and the field can only take one of these two values.
TINYINT - 1 byte integer value between 0 and 255.
MONEY - 8 bytes Adjustable integer between –922,337,203,685,477.5808 and 922,337,203,685,477.5807.
DATETIME (see DOUBLE) – 8 bytes A date or time value between the years 100 and 9999.
UNIQUEIDENTIFIER - 128 bits A unique identification number used for remote procedure calls.
REAL —— 4 bytes single-precision floating point value, negative values from – 3.402823E38 to – 1.401298E-45, positive values from 1.401298E-45 to 3.402823E38, and zero.
FLOAT - 8 bytes double precision floating point value, negative values from - 1.79769313486232E308 to - 4.94065645841247E-324, positive values from 4.94065645841247E-324 to 1.79769313486232E308, and zero .
SMALLINT - 2 bytes short integer between – 32,768 and 32,767.
INTEGER - 4 bytes long integer between – 2,147,483,648 and 2,147,483,647.
DECIMAL - 17 bytes Exact numeric data type, ranging from 1028 - 1 to - 1028 - 1. You can define the precision (1 - 28) and size (0 -- defines the precision). The default precision and size are 18 and 0 respectively.
TEXT — 2 bytes per character (see Note) Zero to maximum 2.14 gigabytes (GB).
IMAGE - as needed from zero to a maximum of 2.14 gigabytes. Used for OLE objects.
CHARACTER——Each character occupies 2 bytes (see "Note") From zero to 255 characters
In the Java programming language, how to create Access fields.
●BINARY (binary type): If you manually create table fields in Access, you cannot find this type. There are two keywords for creating this data field using Java language programming: BINARY and VARBINARY. You can choose any one.
●BIT (yes/no type): There are 4 keywords to use Java language programming to create this data field: BIT, LOGICAL, LOGICAL1, YESNO, you can choose any one.
●TINYINT (number, byte type): There are two programming keywords: INTEGER1, BYTE, you can choose any one.
●MONEY (currency type): There are two programming keywords: MONEY and CURRENCY. You can choose any one.
●DATETIME (date/time type): There are 4 programming keywords: DATETIME, DATE, TIME, TIMESTAMP, you can choose any one.
●UNIQUEIDENTIFIER (numeric synchronous copy ID type): There is 1 programming keyword: GUID.
●REAL (numeric single precision type): There are 4 programming keywords: REAL, SINGLE, FLOAT4, IEEESINGLE, you can choose any one.
●FLOAT (numeric double precision type): There are 6 programming keywords: NUMERIC, FLOAT, DOUBLE, FLOAT8, IEEEDOUBLE, NUMBER. You can choose any one.
SMALLINT (numeric integer type): There are three programming keywords: SMALLINT, SHORT, INTEGER2, you can choose any one.
●INTEGER (numeric long integer type): There are 4 programming keywords: INTEGER, LONG, INT, INTEGER4, you can choose any one. Note that Access's long integer is 4 bytes, not 8 bytes.
DECIMAL (decimal) In the Access Help "Equivalent ANSI SQL Data Types", the synonymous keyword for defining DECIMAL is NUMERIC, but when using NUMERIC, the field type is double precision. .
●TEXT (remarks) There are 4 programming keywords: LONGTEXT, LONGCHAR, MEMO, NOTE, you can choose any one.
●IMAGE (OLE object) There are 4 programming keywords: IMAGE, GENERAL, LONGBINARY, OLEOBJECT, you can choose any one.
●CHARACTER (text) Programming keywords are: TEXT(n), CHAR(n), ALPHANUMERIC(n), STRING(n), VARCHAR(n), you can choose any one. Note that (1) n cannot be greater than 255; (2) When only the TEXT keyword is used, the default size is 255.
●Automatic numbering: There are two programming keywords: COUNTER and AUTOINCREMENT, you can choose any one.
Related recommendations: access database tutorial
The above is the detailed content of Introduction to access common fields. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The advantage of multithreading is that it can improve performance and resource utilization, especially for processing large amounts of data or performing time-consuming operations. It allows multiple tasks to be performed simultaneously, improving efficiency. However, too many threads can lead to performance degradation, so you need to carefully select the number of threads based on the number of CPU cores and task characteristics. In addition, multi-threaded programming involves challenges such as deadlock and race conditions, which need to be solved using synchronization mechanisms, and requires solid knowledge of concurrent programming, weighing the pros and cons and using them with caution.

SQL IF statements are used to conditionally execute SQL statements, with the syntax as: IF (condition) THEN {statement} ELSE {statement} END IF;. The condition can be any valid SQL expression, and if the condition is true, execute the THEN clause; if the condition is false, execute the ELSE clause. IF statements can be nested, allowing for more complex conditional checks.

The main reasons why you cannot log in to MySQL as root are permission problems, configuration file errors, password inconsistent, socket file problems, or firewall interception. The solution includes: check whether the bind-address parameter in the configuration file is configured correctly. Check whether the root user permissions have been modified or deleted and reset. Verify that the password is accurate, including case and special characters. Check socket file permission settings and paths. Check that the firewall blocks connections to the MySQL server.

How to avoid the third-party interface returning 403 error in the Node environment. When calling the third-party website interface using Node.js, you sometimes encounter the problem of returning 403 error. �...

Methods to solve the cross-domain problem of Vue Axios include: Configuring the CORS header on the server side using the Axios proxy using JSONP using WebSocket using the CORS plug-in

How to configure Zend in Apache? The steps to configure Zend Framework in an Apache Web Server are as follows: Install Zend Framework and extract it into the Web Server directory. Create a .htaccess file. Create the Zend application directory and add the index.php file. Configure the Zend application (application.ini). Restart the Apache Web server.

Get ComponentVerify in EasyWechat5.5...

Apache server is a powerful web server software that acts as a bridge between browsers and website servers. 1. It handles HTTP requests and returns web page content based on requests; 2. Modular design allows extended functions, such as support for SSL encryption and dynamic web pages; 3. Configuration files (such as virtual host configurations) need to be carefully set to avoid security vulnerabilities, and optimize performance parameters, such as thread count and timeout time, in order to build high-performance and secure web applications.
