Calling background stored procedures in ACCESS_PHP tutorial
ACCESS is an excellent front-end development tool for Client/Server. It is easy to learn and use, has a friendly interface, is simple to develop, and has flexible interfaces with other databases. However, it is relatively slow when processing large amounts of data. Shenzhen Power Supply Bureau currently has 600,000 users, and has 6 business offices below, which are connected to the bureau through 64K DDN. If one business office wants to handle 10,000 users, it will take 2 to 3 hours, seriously affecting the development of other businesses. Therefore, when there is a large amount of data that needs to be processed, it cannot be processed on the Client side, but must be processed on the Server side.
However, most connections between ACCESS and the server are through ODBC, which increases the difficulty of calling background stored procedures. Through long-term exploration in actual work, the author can use the following three methods to call background stored procedures according to different business needs.
1. Access submits jobs to the background, and each job corresponds to a stored procedure. In SQL Server 6.5, the corresponding Task is created through Task Manager; in Oracle 8.0, the corresponding Job is created through Managing Job Queue. In Access, insert a job in the job_list table. These jobs generally run once every night. The businesses corresponding to these jobs generally need to process a very large amount of data, and the real-time performance is low. A typical example in our business is the calculation of a large amount of electricity bills every night.
2. Create some triggers on the server side and activate these triggers in Access. In SQL Server 6.5 and Oracle 8.0, this is achieved through Create Trigger. In Access, different triggers are activated by inserting, modifying, and deleting records according to different businesses. An example in our business is that when the business staff modifies the user's electricity meter reading and activates the trigger to calculate the electricity bill, the user's electricity bill can be recalculated immediately. In this way, you can share the same program with batch calculation of electricity bills without having to re-develop it on the Access side, which can speed up the response speed of the front-end.
3. The above two methods can only be said to be indirect calls to the background stored procedures. Access also provides a direct call method. You can use Access to pass the query and directly send the command to the database server.
The steps to create an Access delivery query are as follows:
(1) Click the "Query" tab in the database window, and then click the "New" button.
(2) Click the "Design View" option in the "New Query" dialog box, and then click the "OK" button.
(3) Click the "Close" button in the "Show Table" dialog box.
(4) On the Query menu, point to SQL Statement Conditions, and then click the Pass command.
(5) On the toolbar, click the Properties button to display the query property table.
(6) In the query attribute table, please set the "ODBC connection string" attribute to specify the database information to be connected. You can enter the connection information: "ODBC;DSN=ntserver0;UID=sa;PWD=;DATABASE=BMS", or use the "Generate" button to generate it.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

1. Open settings in Windows 11. You can use Win+I shortcut or any other method. 2. Go to the Apps section and click Apps & Features. 3. Find the application you want to prevent from running in the background. Click the three-dot button and select Advanced Options. 4. Find the [Background Application Permissions] section and select the desired value. By default, Windows 11 sets power optimization mode. It allows Windows to manage how applications work in the background. For example, once you enable battery saver mode to preserve battery, the system will automatically close all apps. 5. Select [Never] to prevent the application from running in the background. Please note that if you notice that the program is not sending you notifications, failing to update data, etc., you can

DeepSeek cannot convert files directly to PDF. Depending on the file type, you can use different methods: Common documents (Word, Excel, PowerPoint): Use Microsoft Office, LibreOffice and other software to export as PDF. Image: Save as PDF using image viewer or image processing software. Web pages: Use the browser's "Print into PDF" function or the dedicated web page to PDF tool. Uncommon formats: Find the right converter and convert it to PDF. It is crucial to choose the right tools and develop a plan based on the actual situation.

Are you getting "Unable to allow access to camera and microphone" when trying to use the app? Typically, you grant camera and microphone permissions to specific people on a need-to-provide basis. However, if you deny permission, the camera and microphone will not work and will display this error message instead. Solving this problem is very basic and you can do it in a minute or two. Fix 1 – Provide Camera, Microphone Permissions You can provide the necessary camera and microphone permissions directly in settings. Step 1 – Go to the Settings tab. Step 2 – Open the Privacy & Security panel. Step 3 – Turn on the “Camera” permission there. Step 4 – Inside, you will find a list of apps that have requested permission for your phone’s camera. Step 5 – Open the “Camera” of the specified app

In Java, a "field" is a data member in a class or interface that is used to store data or state. The properties of field include: type (can be any Java data type), access rights, static (belongs to a class rather than an instance), final (immutable) and transient (not serialized). Field is used to store state information of a class or interface, such as storing object data and maintaining object state.

The Java reflection mechanism allows programs to dynamically modify the behavior of classes without modifying the source code. By operating the Class object, you can create instances through newInstance(), modify private field values, call private methods, etc. Reflection should be used with caution, however, as it can cause unexpected behavior and security issues, and has a performance overhead.

Common exception types and their repair measures in Java function development During the development of Java functions, various exceptions may be encountered, which affect the correct execution of the function. The following are common exception types and their repair measures: 1. NullPointerException Description: Thrown when accessing an object that has not been initialized. Fix: Make sure you check the object for non-null before using it. Sample code: try{Stringname=null;System.out.println(name.length());}catch(NullPointerExceptione){

Oracle can read dbf files through the following steps: create an external table and reference the dbf file; query the external table to retrieve data; import the data into the Oracle table.

What does a computer memory module look like? This is an overview of the graphics card and memory module in the computer. The computer's independent graphics card is inserted into the graphics card slot, with a fan, and the memory module is inside the memory module slot on the computer's motherboard, shaped like a green rectangle. Laptop memory modules are different from desktop memory modules, and they cannot be used interchangeably. Appearance difference 1: Desktop memory, slender, 13-14 cm in length. 2: Notebook memory is shorter, about five centimeters. Memory is the bridge in the computer, responsible for data exchange between the processor and hardware such as hard disk, motherboard, and graphics card. The red circle on the way is the memory stick, next to the CPU fan and plugged into the memory stick. Look, a computer memory stick looks like this. Use a screwdriver to open the cover of the desktop computer. The red circle in the middle is the memory module. What is a memory stick?
