Search

Download this Manual
PDF (US Ltr) - 43.1Mb
PDF (A4) - 43.2Mb
Man Pages (TGZ) - 296.0Kb
Man Pages (Zip) - 401.3Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 221 to 230 of 352 total results
https://dev.mysql.com/doc/refman/8.0/en/aggregate-functions.html
This section describes aggregate functions that operate on sets of values. They are often used with a GROUP BY clause to group values into subsets. If you use an aggregate function in a statement containing no GROUP BY clause, it is equivalent to ...
https://dev.mysql.com/doc/refman/8.0/en/archive-storage-engine.html
The ARCHIVE storage engine produces special-purpose tables that store large amounts of unindexed data in a very small footprint. To enable this storage engine if you build MySQL from source, invoke CMake with the -DWITH_ARCHIVE_STORAGE_ENGINE ...
https://dev.mysql.com/doc/refman/8.0/en/audit-log-security.html
By default, contents of audit log files produced by the audit log plugin are not encrypted and may contain sensitive information, such as the text of SQL statements. For security reasons, audit log files should be written to a directory accessible ...
https://dev.mysql.com/doc/refman/8.0/en/batch-mode.html
In the previous sections, you used mysql interactively to enter statements and view the results. If you want the script to continue even if some of the statements in it produce errors, you should use the --force command-line option. Why use a ...
https://dev.mysql.com/doc/refman/8.0/en/binary-log.html
The binary log contains “events” that describe database changes such as table creation operations or changes to table data. It also contains events for statements that potentially could have made changes (for example, a DELETE which matched no ...
https://dev.mysql.com/doc/refman/8.0/en/built-in-function-reference.html
The following table lists each built-in (native) function and operator and provides a short description of each one. For a table listing functions that are loadable at runtime, see Section 14.2, “Loadable Function Reference”. ->> Return value ...
https://dev.mysql.com/doc/refman/8.0/en/case-sensitivity.html
For nonbinary strings (CHAR, VARCHAR, TEXT), string searches use the collation of the comparison operands. For binary strings (BINARY, VARBINARY, BLOB), comparisons use the numeric values of the bytes in the operands; this means that for alphabetic ...
https://dev.mysql.com/doc/refman/8.0/en/charset-conversion.html
To convert a binary or nonbinary string column to use a particular character set, use ALTER TABLE. For successful conversion to occur, one of the following conditions must apply: If the column has a binary data type (BINARY, VARBINARY, BLOB), all ...
https://dev.mysql.com/doc/refman/8.0/en/check-table.html
option: { FOR UPGRADE | QUICK | FAST | MEDIUM | EXTENDED | CHANGED } CHECK TABLE checks a table or tables for errors. CHECK TABLE can also check views for problems, such as tables that are referenced in the view definition that no longer exist. To ...
https://dev.mysql.com/doc/refman/8.0/en/checking-gpg-signature.html
Another method of verifying the integrity and authenticity of a package is to use cryptographic signatures. This is more reliable than using MD5 checksums, but requires more work. GnuPG is an Open Source alternative to the well-known Pretty Good ...
Displaying 221 to 230 of 352 total results