Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 1e1c9b5

Browse files
authored
Merge pull request #15943 from MicrosoftDocs/FromPublicRepo
Confirm merge from FromPublicRepo to master to sync with https://github.com/MicrosoftDocs/sql-docs (branch live)
2 parents 0dbe28e + 937b77e commit 1e1c9b5

7 files changed

Lines changed: 16 additions & 12 deletions

docs/odbc/reference/syntax/sqlcancelhandle-function.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,7 @@ ms.author: v-daenge
1717
---
1818
# SQLCancelHandle Function
1919
**Conformance**
20-
Version Introduced: ODBC 3.8
21-
22-
Standards Compliance: None
20+
Version Introduced: ODBC 3.8 Standards Compliance: None
2321

2422
It is expected that most ODBC 3.8 (and later) drivers will implement this function. If a driver does not, a call to **SQLCancelHandle** with a connection handle in the *Handle* parameter will return SQL_ERROR with a SQLSTATE of IM001 and message 'Driver does not support this function'' A call to **SQLCancelHandle** with a statement handle as the *Handle* parameter will be mapped to a call to **SQLCancel** by the Driver Manager and can be processed if the driver implements **SQLCancel**. An application can use **SQLGetFunctions** to determine if a driver supports **SQLCancelHandle**.
2523

docs/odbc/reference/syntax/sqlcompleteasync-function.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,7 @@ ms.author: v-daenge
1717
---
1818
# SQLCompleteAsync Function
1919
**Conformance**
20-
Version Introduced: ODBC 3.8
21-
22-
Standards Compliance: None
20+
Version Introduced: ODBC 3.8 Standards Compliance: None
2321

2422
**Summary**
2523
**SQLCompleteAsync** can be used to determine when an asynchronous function is complete using either notification- or polling-based processing. For more information about asynchronous operations, see [Asynchronous Execution](../../../odbc/reference/develop-app/asynchronous-execution.md).

docs/odbc/reference/syntax/sqlgetinfo-function.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ SQLRETURN SQLGetInfo(
6666
6767
For all other types of data, the value of *BufferLength* is ignored and the driver assumes the size of \**InfoValuePtr* is SQLUSMALLINT or SQLUINTEGER, depending on the *InfoType*.
6868
69-
## Return Value
69+
## Returns
7070
7171
SQL_SUCCESS, SQL_SUCCESS_WITH_INFO, SQL_ERROR, or SQL_INVALID_HANDLE.
7272

docs/odbc/reference/syntax/sqlsetpos-function.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ SQLRETURN SQLSetPos(
6565
6666
For more information, see "Comments."
6767
68-
**Returns**
68+
## Returns
6969
7070
SQL_SUCCESS, SQL_SUCCESS_WITH_INFO, SQL_NEED_DATA, SQL_STILL_EXECUTING, SQL_ERROR, or SQL_INVALID_HANDLE.
7171

docs/relational-databases/errors-events/mssqlserver-137-database-engine-error.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,12 +29,15 @@ ms.author: mathoma
2929
## Explanation
3030
This error occurs when a variable is used in a SQL script without first declaring the variable. The following example returns error 137 for both the SET and SELECT statements because **\@mycol** is not declared.
3131

32+
```sql
3233
SET @mycol = 'ContactName';
3334

34-
SELECT @mycol;
35+
SELECT @mycol;
36+
```
3537

3638
One of the more complicated causes of this error includes the use of a variable that is declared outside the EXECUTE statement. For example, the variable **\@mycol** specified in the SELECT statement is local to the SELECT statement; thus it is outside the EXECUTE statement.
3739

40+
```sql
3841
USE AdventureWorks2012;
3942

4043
GO
@@ -43,13 +46,15 @@ DECLARE @mycol nvarchar(20);
4346

4447
SET @mycol = 'Name';
4548

46-
EXECUTE ('SELECT @mycol FROM Production.Product;');
49+
EXECUTE ('SELECT @mycol FROM Production.Product;');
50+
```
4751

4852
## User Action
4953
Verify that any variables used in a SQL script are declared before being used elsewhere in the script.
5054

5155
Rewrite the script so that it does not reference variables in the EXECUTE statement that are declared outside of it. For example:
5256

57+
```sql
5358
USE AdventureWorks2012;
5459

5560
GO
@@ -58,7 +63,8 @@ DECLARE @mycol nvarchar(20) ;
5863

5964
SET @mycol = 'Name';
6065

61-
EXECUTE ('SELECT ' + @mycol + ' FROM Production.Product';) ;
66+
EXECUTE ('SELECT ' + @mycol + ' FROM Production.Product';) ;
67+
```
6268

6369
## See Also
6470
[EXECUTE (Transact-SQL)](~/t-sql/language-elements/execute-transact-sql.md)

docs/relational-databases/errors-events/mssqlserver-605-database-engine-error.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ If the 605 error is not transient, the problem is severe and must be corrected b
4848

4949
1. Identify the tables associated with the allocation units specified in the message by running the following query. Replace `allocation_unit_id` with the allocation units specified in the error message.
5050

51+
```sql
5152
USE`database_name`;
5253

5354
GO
@@ -67,6 +68,7 @@ If the 605 error is not transient, the problem is severe and must be corrected b
6768
ORDER BY au.allocation_unit_id;
6869

6970
GO
71+
```
7072

7173
2. Execute DBCC CHECKTABLE without a REPAIR clause on the table associated with the second allocation unit ID specified in the error message.
7274

docs/relational-databases/security/encryption/sql-server-and-database-encryption-keys-database-engine.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.author: jaszymas
2424

2525
### Service master key
2626

27-
The Service Master Key is the root of the SQL Server encryption hierarchy. The SMK is automatically generated the first time the [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] instance is started and is used to encrypt a linked server password, credentials, and the database master key. The SMK is encrypted by using the local machine key using the Windows Data Protection API (DPAPI). The DPAPI uses a key that is derived from the Windows credentials of the [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] service account and the computer's credentials. The service master key can only be decrypted by the service account under which it was created or by a principal that has access to the machine's credentials.
27+
The Service Master Key is the root of the SQL Server encryption hierarchy. The SMK is automatically generated the first time the [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] instance is started and is used to encrypt a linked server password, credentials, and the database master key in each database. The SMK is encrypted by using the local machine key using the Windows Data Protection API (DPAPI). The DPAPI uses a key that is derived from the Windows credentials of the [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] service account and the computer's credentials. The service master key can only be decrypted by the service account under which it was created or by a principal that has access to the machine's credentials.
2828

2929
The Service Master Key can only be opened by the Windows service account under which it was created or by a principal with access to both the service account name and its password.
3030

0 commit comments

Comments
 (0)