分析一下聚合函数与连接表的组合使用_MySQL
bitsCN.com
分析一下聚合函数与连接表的组合使用
看这样一个关系
Customers(cust_id,cust_name,cust_contact)
Orders(order_num,cust_id,order_date)
如果有这样的检索语句:
Sql代码
select cust_name,cust_contact,(
select count(*) from Orders
where Orders.cust_id=Customers.cust_id
group by cust_id)
from Customers
其运作步骤为:
1.从Orders表中检索出每个cust_id所具有的订单数量
可以那么做,因为孤立摆出count(*)是在group by 顾客编号基础上聚合的。
并且在聚合的之前,先进行连接表操作。把orders , Customers连接起来了。
这样内外只的就是同意顾客的信息.
2.外层列出其他需要的顾客信息。
注意点:
内层的通常用做单独孤立的聚合函数,
内层的分组操作前必须给出与外层的连接条件。
外层的select后面的选择列基本都是在外面的表里。
总结,这个句子究竟属于子查询呢还是普通的连接。
很明显。是子查询,以为是select 里面包含一个select 句子。
非常特殊,子句可以用作一个检索列!~就是这样。
以后碰到突然要分组但是又涉及两个不同的表,可以尝试这样的思路。
bitsCN.com

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)
