Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 3: Rules for Words and Names in the SAS Language
Table 3.1: Maximum Length of User-Supplied SAS Names
Chapter 4: SAS Language Elements
Table 4.1: SAS Formats and Byte Ordering
Table 4.2: Integer Binary Notation and Programming Languages
Table 4.3: Types of Financial Functions
Table 4.4: Relationship among SAS ARM Macros and ARM API Function Calls
Table 4.5: Global ARM Macro Variables
Table 4.6: Using _ARMACRO and _ARMSCL to Set the ARM Macro Environment
Table 4.7: Executable Statements in the DATA Step
Table 4.8: Declarative Statements in the DATA Step
Table 4.9: Order of Precedence for SAS Execution Mode Options
Chapter 5: SAS Variables
Table 5.1: Variable Attributes
Table 5.2: Index Type Attribute Values
Table 5.3: Resulting Variable Types and Lengths Produced When They Are Not
Table 5.4: Name Range Lists
Table 5.5: Statements versus Data Set Options for Dropping, Keeping, and Renaming Variables
Table 5.6: Status of Variables and Variable Names When Dropping, Keeping, and Renaming Variables
Table 5.7: Summary of Floating-Point Numbers Stored in 8 Bytes
Table 5.8: Representation of the Numbers 256 to 272 in Eight Bytes
Chapter 6: Missing Values
Table 6.1: Numeric Value Sort Order
Table 6.2: Representing Missing Values
Chapter 7: Expressions
Table 7.1: Standard Notation for Numeric Constants
Table 7.2: Characters That Cause Misinterpretation When Following a Character Constant
Table 7.3: Arithmetic Operators
Table 7.4: Comparison Operators
Table 7.5: Logical Operators
Table 7.6: Order of Evaluation in Compound Expressions
Chapter 8: Dates, Times, and Intervals
Table 8.1: Tasks with Dates and Times, Part 1
Table 8.2: Tasks with Dates and Times, Part 2
Table 8.3: Intervals Used with Date and Time Functions
Table 8.4: Using INTCK And INTNX
Table 8.5: Single-Unit Intervals
Table 8.6: Single-Unit Time Intervals
Table 8.7: Month2 Intervals
Table 8.8: Using the INTNX Function
Table 8.9: Counting Two-Week Intervals
Table 8.10: Using INTNX to See The Beginning Date of an Interval
Table 8.11: Using INTNX to Determine When an Interval Begins
Table 8.12: Using the INTNX Function to Show the Beginning of the Next Interval
Chapter 10: SAS Output
Table 10.1: Default Destinations of SAS Output
Table 10.2: List of Tagsets that SAS Supplies and Supports
Table 10.3: Additional Tagsets that SAS Supplies but Does Not Support
Table 10.4: Destination Category Table
Table 10.5: Default List for Each ODS Destination
Chapter 12: WHERE-Expression Processing
Table 12.1: Arithmetic Operators
Table 12.2: Comparison Operators
Table 12.3: Logical (Boolean) Operators
Table 12.4: Constructing Efficient WHERE Expressions
Table 12.5: Tasks Requiring Either WHERE Expression or Subsetting IF Statement
Chapter 15: Monitoring Performance Using Application Response Measurement (ARM)
Table 15.1: Relationship Between ARM API Function Calls and ARM Macros
Chapter 17: Printing with SAS
Table 17.1: Available Print Output Formats
Table 17.2: ODS Destinations that make use of the Universal Printing interface
Table 17.3: Commands to Open Universal Printing Windows
Table 17.4: Menu choices or commands open Universal Printing windows
Table 17.5: System options that control Universal Printing
Chapter 18: Introduction to the SAS Windowing Environment
Table 18.1: Mouse Actions and Keyboard Equivalents for z/OS
Table 18.2: List of Portable SAS Windows and Window Opening Commands
Table 18.3: Other Commands That You Can Use in the Keys Window
Chapter 20: DATA Step Processing
Table 20.1: Default Execution for Statements in a DATA Step
Table 20.2: Common Methods that Alter the Sequence of Execution
Table 20.3: Language Elements that Alter Programming Flow
Table 20.4: Causes that Stop DATA Step Execution
Chapter 21: Reading Raw Data
Table 21.1: Reading Different Types of Numeric Data
Table 21.2: Reading Instream Data and External Files Containing Leading Blanks and Semicolons
Table 21.3: Additional Data-Reading Features
Table 21.4: Informats for Native or IBM 370 Mode
Table 21.5: SAS Informats for Reading Column-Binary Data
Chapter 23: Reading, Combining, and Modifying SAS Data Sets
Table 23.1: Statements and Options That Control Reading and Writing
Table 23.2: Statements or Procedures for Combining SAS Data Sets
Table 23.3: MODIFY with BY versus UPDATE
Table 23.4: Most Common Mnemonic Values of _IORC_ for DATA Step Processing
Chapter 26: SAS Data Libraries
Table 26.1: Syntax for Assigning a Libref
Chapter 28: SAS Data Files
Table 28.1: _AT* Variables
Table 28.2: _ATOPCODE_ Values
Table 28.3: Naming Generation Group Data Sets
Table 28.4: Requesting Specific Generation Data Sets
Table 28.5: Circumstances That Cause Integrity Constraints to Be Preserved
Table 28.6: WHERE Conditions That Can Be Optimized
Table 28.7: Maintenance Tasks and Index Results
Chapter 34: Processing Data Using Cross-Environment Data Access (CEDA)
Table 34.1: SAS File Processing Provided by CEDA
Table 34.2: Compatibility Across Environments
Chapter 35: SAS 9.1 Compatibility with SAS Files From Earlier Releases
Table 35.1: File Extensions for a SASData File in DifferentOperating Environments
Table 35.2: Default Library Engine Assignment in SAS 9
Chapter 39: External Files
Table 39.1: Referencing External Files Directly
Table 39.2: Referencing External Files Indirectly
Table 39.3: Referencing Many Files Efficiently
Table 39.4: Referencing External Files with Other Access Methods
Previous page
Table of content
Next page
SAS 9.1 Language Reference Concepts
ISBN: 1590471989
EAN: 2147483647
Year: 2004
Pages: 255
Authors:
SAS Publishing
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.1 Authentication with Public Keys
Step 4.2 Passphrase Considerations
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
SQL Hacks
Hack 57. Generate Unique Sequential Numbers
Hack 60. Create a List of Personalized Parameters
Hack 61. Set Security Based on Rows
Hack 81. Build Decision Tables
Hack 92. Deploy Applications
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco IDS Products
Cisco VPN Products
Deployment Scenarios
Monitoring and Troubleshooting Cisco Remote Access VPN
Site-to-Site VPN Setup Using Preshared Keys
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Key Points
Modifying Shape Connections
Creating Project Schedules
Adding Door, Window, and Furniture Shapes to Office Layouts
Creating Network Reports
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
Culture and Religion
Cross-Century Worldviews
Conclusion
Appendix B Leadership Test
FileMaker 8 Functions and Scripts Desk Reference
Get(DocumentsPath)
GetAsSVG()
GetNextSerialValue()
MonthNameJ()
RomanZenkaku()
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies