Flylib.com
List of Outputs
Previous page
Table of content
Chapter 2: SAS Data Set Options
Output 2.1: PROC PRINT Output Using OBS= and FIRSTOBS=
Output 2.2: PROC PRINT Output Using a WHERE Statement
Output 2.3: PROC PRINT Output Using a WHERE Statement and OBS=
Output 2.4: PROC PRINT Output Using WHERE Statement, OBS=, and FIRSTOBS=
Output 2.5: PROC PRINT Output Showing Observation 6 Deleted
Output 2.6: PROC PRINT Output Using OBS=
Output 2.7: PROC PRINT Output Using OBS= and FIRSTOBS=
Output 2.8: SAS Log Output
Output 2.9: SAS Log Output
Output 2.10: SAS Log Output
Chapter 4: Functions and CALL Routines
Output 4.1: The CALL Routine Example
Output 4.2: The Function Example
Output 4.3: SAS Debugging Output
Chapter 4: Functions and CALL RoutinesDictionary
Output 4.5: Generalized Edit Distance Based on Operation
Output 4.6: SAS Log Results from CALL PRXDEBUG
Output 4.6: The RANBIN Example
Output 4.7: The RANCAU Example
Output 4.8: The RANEXP Example
Output 4.9: The RANGAM Example
Output 4.10: The RANNOR Example
Output 4.11: The RANPOI Example
Output 4.12: The RANTBL Example
Output 4.13: The RANTRI Example
Output 4.14: The RANUNI Example
Output 4.15: SAS Output from the CALL SCAN Routine
Output 4.16: SAS Output from the CALL SCANQ Routine
Output 4.17: Random Number String Seeded with CALL STREAMINIT
Output 4.18: Computations of the Noncentrality Parameters from the Chi-squared Distribution
Output 4.19: Results of Comparing Two Strings by Using the COMPARE Function
Output 4.20: Results of Using the Truncation Modifier
Output 4.21: Generalized Edit Distance Based on Operation
Output 4.22: Results of Comparing Two Strings by Computing the Levenshtein Edit Distance
Output 4.23: Removing Matching Quotation Marks with the DEQUOTE Function
Output 4.24: FNONCT Example Output
Output 4.25: Partial SAS LogIFC Function
Output 4.26: Partial SAS LogIF/THEN/ELSE Construct
Output 4.27: Output from a WHERE Statement
Output 4.28: Converting Strings to Name Literals with NLITERAL
Output 4.29: Determining the Validity of SAS Variable Names with NLITERAL
Output 4.30: Probabilities from PROBMC
Output 4.31: Group Differences
Output 4.32: Confidence Intervals
Output 4.33: Output Showing the Results of Using PROPCASE with a Second Argument
Output 4.34: Output from the DATA Step
Output 4.35: Output from PROC SQL
Output 4.36: Output from Matching Rows That Have the Same Names
Output 4.37: Zip Code Output from the DATA Step
Output 4.38: Zip Code Output from PROC SQL
Output 4.39: Output from PRXPOSNFirst and Last Names
Output 4.40: Output of Valid Names
Output 4.41: Results of Rounding Based on the Value of the Rounding Unit
Output 4.42: Results of Rounding by the Reciprocal of an Integer
Output 4.43: Results of Rounding When Values Are Halfway between Multiples of the Rounding Unit
Output 4.44: Results That Are Returned by the ROUND and ROUNDE Functions
Output 4.45: Results That are Returned by the ROUNDE and ROUND Functions
Output 4.46: Results That Are Returned by the ROUNDZ and ROUND Functions
Output 4.47: Results of Replacing a Semicolon with a Space
Output 4.48: Output from the SCANQ Function
Output 4.49: Comparison of ValuesThe SMALLEST and the ORDINAL Functions
Output 4.50: Costs for SPEDIS Operations.
Output 4.51: Results from the STRIP Function
Output 4.52: Results from the SUBSTRN Function
Output 4.53: Computations of the Noncentrality Parameter from the t Distribution
Example Code 4.1: Obtaining the Label of the Variable NAME
Chapter 7: StatementsDictionary
Output 7.1: Array Names That Have Leading Zeroes
Output 7.2: Output from Combining Multiple Observations
Output 7.3: Log Output from CATNAME Statement
Output 7.4: Results from Associating Multiple Variables with a Single Format
Output 7.5: The NUMS Data Set
Output 7.6: Data Set SCORES
Output 7.7
Output 7.8: Data Set Schedule
Output 7.9: Data Set Office2
Output 7.10: Output from Comma-Delimited Data
Output 7.11: SCORES Data Set
Output 7.12
Output 7.13: Log Listing of Missing Data
Output 7.14: Log Listing of Variable-Length Records and Record Lengths
Output 7.15
Output 7.16: Results of Updating the RECDATE Field
Output 7.17: Results of Updating the INSTOCK and RECDATE Fields
Output 7.18: Results of Updating the RECDATE and PRICE Fields
Output 7.19: Results of Updating the INSTOCK and RECDATE Fields by Using an Index
Output 7.20: Results of Updating the INSTOCK and RECDATE Fields by Using the
Output 7.21: The Updated INVTY.STOCK Data Set
Output 7.22: Output from Writing Observations to a Specific SAS Data Set
Output 7.23: PUT Statement Output for the Northeast Region
Output 7.24: SAS Log Results from the PUTLOG Statement
Output 7.25: Individual Examination Scores
Output 7.26
Output 7.27
Chapter 8: SAS System Options
Output 8.1: Restricted Option Information
Output 8.2: Option Value Information for the System Option CENTER
Ouput 8.3: Descriptive Information for the System Option CENTER
Output 8.4: ARM Log for ARM_IOM Subsystem
Output 8.5: PROC PRINT Output Using OBS= and FIRSTOBS=
Output 8.6: PROC PRINT Output Using a WHERE Statement
Output 8.7: PROC PRINT Output Using a WHERE Statement and OBS=
Output 8.8: PROC PRINT Output Using WHERE Statement, OBS=, and FIRSTOBS=
Output 8.9: PROC PRINT Output Showing Observation 6 Deleted
Output 8.10: PROC PRINT Output Using OBS=
Output 8.11: PROC PRINT Output Using OBS= and FIRSTOBS=
Appendix 1: DATA Step Object Attributes and Methods
Output A1.1: Messier Objects Sorted by Right-Ascension Values
Previous page
Table of content
SAS 9.1 Language Reference Dictionary, Volumes 1, 2 and 3
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 704
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Four Ways in Which You Can Respond to Risk
Understanding the IT Security Process
What Do Attackers Do?
Introducing the Assessment Process
Preparing the Final Report
Network Security Architectures
Secure Networking Threats
Factors in Identity
References
Applied Knowledge Questions
Case Studies
SQL Hacks
Hack 8. Filter Rows and Columns
Hack 21. Report on Any Date Criteria
Hack 38. Find Transposition Errors
Hack 94. Create Users and Administrators
Hack 96. Create an Audit Trail
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Credibility and Computers
Increasing Persuasion through Mobility and Connectivity
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with the Names Collection and Name Object
Working with the Worksheet Object
Working with the Items Collection
Form Events, Properties, and Methods
Properties Merged from OLEObject or OLEControl
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
Culture and Religion
Cross-Century Worldviews
Cognitive Processes
Americanization versus Asianization
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies