zoukankan      html  css  js  c++  java
  • php删除数据

    租房子题目

    1.先 将页面做出来

    <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
    <html xmlns="http://www.w3.org/1999/xhtml">
    <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
    <title>无标题文档</title>
    <link href="css/bootstrap.min.css" rel="stylesheet" type="text/css" />
    <script src="js/jquery-1.11.2.min.js"></script>
    <script src="js/bootstrap.min.js"></script>
    </head>
    
    <body>
    <table class="table table-striped">
      <caption>发布新闻</caption>
      <thead>
        <tr>
          <th>关键字</th>
          <th>区域</th>
          <th>使用面积</th>
          <th>租金</th>
          <th>租赁类型</th>
          <th>房屋类型</th>
          <th>删除</th>
          <th>编辑</th>
        </tr>
      </thead>
      <tbody>
    <?php
    	require_once "./DBDA.class.php";
    	$db = new DBDA();
    	$sql = "select * from house";
    	$arr = $db->query($sql);
    	foreach($arr as $v){
    		echo "
    	<tr>
        	<td>{$v[1]}</td>
            <td>{$v[2]}</td>
            <td>{$v[3]}</td>
            <td>{$v[4]}</td>
            <td>{$v[5]}</td>
            <td>{$v[6]}</td>
    		<td><a href='./shanchuhouse.php?ids={$v[0]}' onclick="return confirm('确认删除吗?')">删除</a></td>
    		<td><a href='./xghouse.php?ids={$v[0]}'>编辑</a></td>
        </tr>
    ";
    	}
    ?>
    <div><a href="./tianjiahouse.php">添加数据</a></div>
    

    当要点击删除按钮时

    ids值在这种情况下用$_GET得到传过来

    <a href='./shanchuhouse.php?ids={$v[0]}' onclick="return confirm('确认删除吗?')">删除</a></td>

     1 <?php
     2 $ids = $_GET["ids"];
     3 $db = new MySQLi("localhost","root","123","phptext");
     4 $sql = "delete from house where ids = '{$ids}'";
     5 $result = $db->query($sql);
     6 if($result){
     7     header("location:housejs.php");
     8 }else{
     9     echo "删除失败";
    10     }

    显示在页面结果如下

      

  • 相关阅读:
    sqlserver 字符串拆分和取某分隔符之前的字符串
    三目运算符引发的一次事故
    SqlServer 查询死锁,杀死死锁进程*转载
    sql不带锁查询
    各种replace待续
    jmeter压力测试
    docker基础学习
    被动式pocscan扫描神器搭建
    (转)Ubuntu 17.04_64上搭建巡风扫描系统(资产信息漏洞扫描内网神器)
    (转)搭建本地 8.8 W 乌云漏洞库
  • 原文地址:https://www.cnblogs.com/forqiwen/p/8324314.html
Copyright © 2011-2022 走看看