blob: dcb5c3085659282c2d83d8fd4f2af3255383af90 [file] [log] [blame] [view]
# Overview
All queries so far have followed the same pattern: a `SELECT` clause followed by a single Cypher call in the `FROM` clause. However, a Cypher query can be used in many other ways. This section highlights some more advanced ways of using the Cypher call within a more complex SQL/Cypher Hybrid Query.