// To protect MySQL injection for Security purpose
$stmt = $conn->prepare($SQuery);
$stmt->bind_param("i", $user_id);
$stmt->execute();
$stmt->bind_result($fullName);
$stmt->store_result();
if($stmt->fetstmt->store_result()
ch()) //fetching the contents of the row

// To protect MySQL injection for Security purpose
$stmt = $conn->prepare($SQuery);
$stmt->bind_param("i", $user_id);
$stmt->execute();
$stmt->bind_result($fullName);
$stmt->store_result();
if($stmt->fetstmt->store_result()  // <-- this looks like a typo
    ch()) //fetching the contents of the row
Be a part of the DaniWeb community

We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.