Simple connection examples
56
You can include the
-c
parameter to specify connection parameters in the
dbisql
command, as described in the procedure above for connecting to
UNIX. If you omit these parameters, the DBISQL logon window appears.
2
Enter the user ID
DBA
and the password
SQL
This is the default user ID and password for Adaptive Server IQ databases
when they are created.
3
Click the Database tab and type the server name (for example,
“hostname_asiqdemo” for the asiqdemo database).
4
If you use TCP/IP to connect to databases, on the Network tab, click on
TCPIP. (If you use the shared memory port for connecting, skip this step.)
If your database is on a remote machine, you must add host information in
the space beside TCPIP by typing “host=servername:nnnn” where
servername is the name of your system and nnnn is your port number. (The
default port number is 2638, but if the host was started with a different
number, use that instead.)
5
Click OK to connect to the database.
6
After you connect to the database, the DBISQL window appears. The
DBISQL window displays the database name, user ID, and server name
for the connection on its title bar. The words “Connected to database”
appear in the Statistics window along with a message displaying the
collation sequence used by the database.
You can connect to any database server that is already running in the same
manner. You can also specify a non-default character set and language.
For more information on using DBISQL, see the chapter “Getting Started with
DBISQL” in the Introduction to Adaptive Server IQ.
Connecting to other databases from DBISQL
The following procedure shows how to connect to a running database from
DBISQL.
Summary of Contents for Adaptive Server IQ 12.4.2
Page 1: ...Administration and Performance Guide Adaptive Server IQ 12 4 2 ...
Page 16: ...xvi ...
Page 20: ...Related documents xx ...
Page 40: ...Compatibility with earlier versions 20 ...
Page 118: ...Troubleshooting startup shutdown and connections 98 ...
Page 248: ...Importing data by replication 228 ...
Page 306: ...Integrity rules in the system tables 286 ...
Page 334: ...Cursors in transactions 314 ...
Page 396: ...Users and permissions in the system tables 376 ...
Page 438: ...Determining your data backup and recovery strategy 418 ...
Page 484: ...Network performance 464 ...
Page 500: ...System utilities to monitor CPU use 480 ...
Page 514: ...Characteristics of Open Client and jConnect connections 494 ...
Page 536: ...Index 516 ...