Define mysql_fetch_object(), Database Management System

Assignment Help:

What are the differences among MySQL_fetch_array(), MySQL_fetch_object(), MySQL_fetch_row()?

Mysql_fetch_object returns the result from the database like objects while mysql_fetch_array returns result as an array.

This will permit access to the data via the field names E.g. using mysql_fetch_object field can be accessed as $result-

>name andusing mysql_fetch_array field can be accessed as $result->[name].

mysql_fetch_row($result):- where $result is the result resource come back from a successful query executed using the mysql_query() function.

Illustration:

$result = mysql_query("SELECT * from students);

while($row = mysql_fetch_row($result))

{

Some statement;

}

 


Related Discussions:- Define mysql_fetch_object()

01a_ImportCasting.xlsx, 01a_Broadway_LastFirst_yyyy-mm-dd Capstone Exercise...

01a_Broadway_LastFirst_yyyy-mm-dd Capstone Exercises You work as a production assistant in the office of the Green Man Theatre. One of your duties is to maintain the company datab

Explain saving derived attributes to avoid re-computation, Saving Derived A...

Saving Derived Attributes to Avoid Re-computation   As discussed, "redundancy means duplication of exact data". But, if multiple copies of same data are present in the system,

What is rigorous two phase locking protocol, Differentiate strict two phase...

Differentiate strict two phase locking protocol and rigorous two phase locking protocol. In strict two phase locking protocol all exclusive mode locks taken by a transaction is

Define tuple variable, Define tuple variable Tuple variable is a type o...

Define tuple variable Tuple variable is a type of variable whose domain is the set of all tuples.

Difference between operating system and database security, Difference betwe...

Difference between Operating System and Database Security Security within the operating system can be executed at various levels ranging from passwords for access to system, t

Describe the composite key, Describe the Composite Key Composite Key: ...

Describe the Composite Key Composite Key: Sometimes one key is not enough to uniquely recognize a row. E.g. in a single class Roll is enough to search a student, but in the w

What is a recursive relationship, Question: (a) Can a set of data requi...

Question: (a) Can a set of data requirements be correctly modelled by two or more different ER diagrams? Explain your answer. You may use a small example, if you think it will

Extended star schema, Northwind Pty Ltd sells a variety of food products th...

Northwind Pty Ltd sells a variety of food products throughout the world. They want to use the reporting features of SAP''s Business Information Warehouse to better understand thei

Explain the two types of participation constraint., Explain the two types o...

Explain the two types of participation constraint. 1. Total: The participation of an entity set E in a relationship set R is said to be total if each entity in E participates i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd