sql server中截取字符串的常用函数

时间:2020-12-26 15:28:43

我们如果要在sql server中,使用截取字符串的方法要怎样使用呢?

sql server提供了3个常用截取字符串方法,LEFT()、RIGHT()、SUBSTRING()

/******  Sql Server中截取字符串的常用方法  ******/

--1、LEFT()方法---
--函数说明---
--1)语法:LEFT(character,integer)
--2)介绍:参数1:要截取的字符串,参数2:截取字符个数
--3)使用:
--返回从字符串左边开始指定个数的字符--
select LEFT('SqlServer_2008',3)
--4)返回:Sql --1、RIGHT()方法---
-- right()函数说明---
--1)语法:RIGHT(character,integer)
--2)介绍:参数1:要截取的字符串,参数2:截取字符个数
--3)使用:
--返回从字符串右边开始指定个数的字符--
select LEFT('SqlServer_2008',4)
--4)返回:2008 --1、SUBSTRING()方法---
-- substring()函数说明---
--1)语法:SUBSTRING(character,start,length)
--2)介绍:参数1:要截取的字符串,参数2:开始截取的下标,参数3:截取的字符长度
--3)使用:
--返回从字符串中间的字符--
select SUBSTRING('SqlServer_2008',4,6)
--4)返回:Server

实例如下:

--截取字符串左边3个字符--
select LEFT('Welcome to China!',7) as 结果1
--截取字符串右边4个字符--
select RIGHT('Welcome to China!',6) as 结果2
--截取字符串中间6个字符(第二个从哪个字符下标开始)
select SUBSTRING('Welcome to China!',9,2) as 结果3

实例结果:

aaarticlea/png;base64,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" alt="" />

PS:

参考来源地址:http://blog.csdn.net/hu_shengyang/article/details/10536881