Hello people this is first time in the history when somebody has take a pain to create such a large ppt it is almost my 5 months laborious work..
although i know ppt cannot b more than 30 slides but at the same time i dont want my readers to to feel the lack of knowledge
THIS PPT BELONGS TO TECHNICALS PERSONS hope u like it thanking you ........
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Hello people this is first time in the history when somebody has take a pain to create such a large ppt it is almost my 5 months laborious work..
although i know ppt cannot b more than 30 slides but at the same time i dont want my readers to to feel the lack of knowledge
THIS PPT BELONGS TO TECHNICALS PERSONS hope u like it thanking you ........
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Your Digital Assistant.
Making complex approach simple. Straightforward process saves time. No more waiting to connect with people that matter to you. Safety first is not a cliché - Securely protect information in cloud storage to prevent any third party from accessing data.
Would you rather make your visitors feel burdened by making them wait? Or choose VizMan for a stress-free experience? VizMan is an automated visitor management system that works for any industries not limited to factories, societies, government institutes, and warehouses. A new age contactless way of logging information of visitors, employees, packages, and vehicles. VizMan is a digital logbook so it deters unnecessary use of paper or space since there is no requirement of bundles of registers that is left to collect dust in a corner of a room. Visitor’s essential details, helps in scheduling meetings for visitors and employees, and assists in supervising the attendance of the employees. With VizMan, visitors don’t need to wait for hours in long queues. VizMan handles visitors with the value they deserve because we know time is important to you.
Feasible Features
One Subscription, Four Modules – Admin, Employee, Receptionist, and Gatekeeper ensures confidentiality and prevents data from being manipulated
User Friendly – can be easily used on Android, iOS, and Web Interface
Multiple Accessibility – Log in through any device from any place at any time
One app for all industries – a Visitor Management System that works for any organisation.
Stress-free Sign-up
Visitor is registered and checked-in by the Receptionist
Host gets a notification, where they opt to Approve the meeting
Host notifies the Receptionist of the end of the meeting
Visitor is checked-out by the Receptionist
Host enters notes and remarks of the meeting
Customizable Components
Scheduling Meetings – Host can invite visitors for meetings and also approve, reject and reschedule meetings
Single/Bulk invites – Invitations can be sent individually to a visitor or collectively to many visitors
VIP Visitors – Additional security of data for VIP visitors to avoid misuse of information
Courier Management – Keeps a check on deliveries like commodities being delivered in and out of establishments
Alerts & Notifications – Get notified on SMS, email, and application
Parking Management – Manage availability of parking space
Individual log-in – Every user has their own log-in id
Visitor/Meeting Analytics – Evaluate notes and remarks of the meeting stored in the system
Visitor Management System is a secure and user friendly database manager that records, filters, tracks the visitors to your organization.
"Secure Your Premises with VizMan (VMS) – Get It Now"
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Strategies for Successful Data Migration Tools.pptxvarshanayak241
Data migration is a complex but essential task for organizations aiming to modernize their IT infrastructure and leverage new technologies. By understanding common challenges and implementing these strategies, businesses can achieve a successful migration with minimal disruption. Data Migration Tool like Ask On Data play a pivotal role in this journey, offering features that streamline the process, ensure data integrity, and maintain security. With the right approach and tools, organizations can turn the challenge of data migration into an opportunity for growth and innovation.
Strategies for Successful Data Migration Tools.pptx
Database MySQL (Part-1)
1. Part 1 of 2 1
By Manjeet Singh Bargoti
DATABASE (Part -1)
Database is piece of software which help us to store data permanently inside the table in
organised manner. Some of databeses is available MySQL, DB2, Oracle, HSQL etc.
How to Setup:
Download XAMPP or WAMP or MAMP and install in your Computer or Laptop.
Launch Control panel and start MySQL and Apache.
Connecting with MySQL Database:
Open Command prompt in window & change the path to bin folder of MySQL as
shown below.
C:/user/HACK > cd C:/xampp/MySQL/bin
Go to control panel of XAMPP (in my computer I’m using XAMPP Server) and
Start MySQL database.
C:/xampp/MySQL/bin > mysql –u root
Maria DB [(none)] > show databases;
Database
information scheme
mysql
test
new scheme
Maria DB [(none)] > use information scheme[Database name];
Database Name: information scheme
Tables
customer
employee
emp
dept
Maria DB [information scheme] > select * from customer[Table Name];
Table Name: customer
CID CNAME Age Location
101 Manjeet 22 Bangalore
102 Ankur 24 Bangalore
103 Sajal 25 Gorakhpur
104 Devendra 26 Gurgaon
105 Aditya 28 Delhi
2. Part 1 of 2 2
By Manjeet Singh Bargoti
Some important Queries of MySQL:
1. Show the all content (data) of table
Select * from customer (table name);
2. Read only customer name and age from customer table.
Select CNAME, Age from customer;
3. Show all customers name who are staying in Bangalore.
Select CNAME from customer
Where location = ‘bangalore’;
4. Show the all customers name and id whose age is less and equal to 25.
Select CNAME, CID from customer
Where age <= 25;
5. Show all employee name which names end with letter ‘a’.
Select CNAME from customer
Where CNAME like “%a”;
6. Show the name of employee from table whose age is 24 and 25.
Select CNAME form customer
Where age in (25, 24);
7. Show me the name of employee from Bangalore and delhi.
Select CNAME from customer
Where location in (‘bangalore’, ‘delhi’);
8. Show the employee name which starts with letter ‘m’.
Select CNAME from customer
Where CNAME like “M%”;
9. Show the employee name which consist the letter ‘a’.
Select CNAME from customer
Where CNAME like “%a%”;
10. Show the employee name which consist only 5 letters.
Select CNAME from customer
Where CNAME like “_ _ _ _ _”;
11. Show the employee name which start with letter ‘a’ and consist only 5 letters.
Select CNAME from customer
Where CNAME like “a_ _ _ _”;
Table Name: employee
EID ENAME Salary Dept
101 Shivesh 10000 Science
102 Praveen 50000 Math
103 Ankur 35000 Science
104 Devendra 25000 Science
105 Aditya 28000 Social
3. Part 1 of 2 3
By Manjeet Singh Bargoti
12. Show the first maximum salary from the table.
Select max (salary)
From employee;
13. Show the total salary which I am paying to employee.
Select sum (salary)
From employee;
14. Show the minimum salary from the table.
Select min (salary)
From employee;
15. Show me the average salary which I am paying.
Select avg (salary)
From employee;
16. Show me the number of employee in employee table.
Select count (EID)
From employee;
17. Print the employee name in upper case.
Select ucase (ENAME)
From employee;
18. Print the employee name in lowercase.
Select lcase (ENAME)
From employee;
19. Remove white space from left side of the string.
Select ltrim (ENAME)
From employee;
20. Remove white space from right side of the string.
Select rtrim (ENAME)
From employee;
21. Remove the white space from both side of the string.
Select trim (ENAME)
From employee;
22. In the output give me only first three letters on department name.
Select mid (dept, 1, 3)
From employee;
23. Show me the current date and time.
Select now ()
From employee;
24. Show me the data of table in descending order.
Select * from employee
Order by EID Desc;
25. In table employee short the data in ascending order.
Select * from employee
Order by EID ASC;
26. Show me top two records from employee table.
Select * from employee
Order by EID ASC limit 2;
4. Part 1 of 2 4
By Manjeet Singh Bargoti
27. Show me the last two records from the employee table.
Select * from employee
Order by EID Desc limit 2;
SQL: Structured Query Language
Select
From
Group by
Having
Order by
Creating a Table in myphpadmin:
Launch XAMPP and open Control panel and start Apache.
Now launch your installed browser and in the browser type localhost.
Click on PhpMyAdmin.
Click the database name or create a new database by click on new.
Click on create.
Create a table in DB by giving the table name and specify the no. of column and
click on go.
Give column name and select the right datatype.
To insert the data click on insert.
Table Name: customer
CID CNAME Age Location
101 Manjeet 22 Bangalore
102 Ankur 24 Bangalore
103 Sajal 25 Gorakhpur
104 Devendra 26 Gurgaon
105 Aditya 28 Delhi
28. In the above table update the customer name Sajal to Vishal.
Update customer
Set Name = ‘Vishal’ Where CID = 103;
29. Delete a particular row from table.
Delete from customer
Where CID = 102;
30. Delete the customer records having ID 102, 103.
Delete from customer
Where CID in (102, 103);
31. Update customer record to Vishal for all those name starts with letter ‘s’.
Update customer
Set name = “Vishal” Where CNAME like “s%”;
5. Part 1 of 2 5
By Manjeet Singh Bargoti
Sub-Query: A query within a query is called subquery. Always inner query will execute
first and output of inner query will be given to the outer query as input.
Rules to build SubQuery:
There should be common column in the table.
Manually analysis which one is outer and which one is inner.
Output should consist of average one column.
Table Name: emp++
EID ENAME Salary Location
101 X 10000 Bangalore
102 Y 25000 Chennai
103 Z 15000 GOA
104 A 36000 Hyderabad
32. Second maximum salary from the table.
Select max (salary) from emp
Where salary < 36000;
Alternate method:
Select max (salary) from emp
Where salary < (Select max (salary) from emp);
33. Third max salary from the table.
Select max (salary) from emp
Where salary < (Select max (salary) from emp
Where salary < (Select max (salary) from emp));
Table Name: emp Table Name: dept
EID ENAME Salary Location EID Dept
101 X 10000 Bangalore 101 Science
102 Y 25000 Chennai 101 Maths
103 Z 15000 GOA 102 Social
104 A 36000 Hyderabad 103 Science
34. Give me the employee name working in science department.
Select ENAME from emp
Where EID in (Select EID from dept where dept = “Science”);
35. Give me employee name and salary working for science and maths dept.
Select ENAME, Salary from emp
Where EID in (Select EID from dept where dept in (“Science”, “Maths”));
36. Give me the dept name of the employee whose salary more than 15000.
Select dept from dept
Where EID in (Select EID from emp where salary > 15000);
6. Part 1 of 2 6
By Manjeet Singh Bargoti
Table Name: employee
EID ENAME LNAME Salary Joining_Date Dept Location
1 Johan A 10000 01 Jan, 2013 Banking Bangalore
2 Michal C 18000 01 Jan, 2013 Insurance Delhi
3 Ray T 25000 01 Feb, 2013 Insurance Mumbai
4 Tom J 36000 01 Feb, 2013 Insurance Bangalore
5 Jarry P 19000 01 Feb, 2013 Insurance Chennai
6 Phillip P 9000 01 Jan, 2013 Science Bangalore
7 Mike K 23000 01 Jan, 2013 Science Mumbai
8 Smith K 20000 01 Feb, 2013 Insurance Delhi
Table Name: incentive
EID IncentiveDate IncentiveAmount
1 01 Feb, 2013 5000
2 01 Feb, 2013 3000
3 01 Feb, 2013 4000
1 01 Jan, 2013 4500
2 01 Jan, 2013 3500
37. Get First Name & Last Name from employee table.
Select ENAME, LNAME from employee;
38. Get First Name from employee.
Select ENAME from employee;
39. Give me unique (distinct) department from employee name.
Select DISTINCT dept from employee;
40. Give me distinct (unique) incentive date.
Select DISTNICT incentivedate from incentive;
41. Give me the length of every name present in the first name column in
employee table.
Select length (ENAME) from employee;
42. Give me the first name of the employee table by replacing ‘o’ with ‘$’.
Select replace (ENAME, ‘o’, ‘$’) from employee;
43. Give me the first name and last name in a single column separated by
underscore.
Select concat (ENAME, ‘_’, LNAME) from employee;
44. Get the first name in ascending order.
Select FNAME from employee
Order by ENAME AES;
45. Get employee detail from employee name whose salary between 15000 to
30000.
Select * from employee
Where salary
Between 15000 and 30000;
7. Part 1 of 2 7
By Manjeet Singh Bargoti
46. Give me the first name of employee who’s joining date between 01 Jan, 2013
to 01 March, 2013.
Select * from employee
Where joining_date
Between 01 Jan, 2013 and 01 March, 2013;
47. Give me the first name of employee whose incentive amount greater than
equal to 4500.
Select ENAME from employee
Where EID in (Select EID from incentive
Where incentiveAmount >=4500);
48. Show me the First name of employee who is getting incentive.
Select ENAME from employee
Where EID in (Select EID from incentive);
49. Show me the First name of employee who did not get incentive.
Select ENAME from employee
Where EID in (Select EID from incentive);
50. Count the number of people city wise and give the o/p.
Select count (CID) from employee
Group by location;
51. Give me the count of people in Bangalore city.
Select count (CID) from employee
Group by location
Having location = “Bangalore”;
52. Give me the incentive amount only of the employee john.
Select incentiveAmount from incentive
Where EID = (Select EID from employee
Where ENAME = “john”);
53. Give top 2 salaries from the employee table.
Select salary from employee
Order by salary desc
Limit 2;
54. Write a query for drop table employee.
Drop table employee;
Joins: When in the output you require column name or names that belongs to different
tables then we use joins.
Rules of Join:
Column name should belong to the different table in order to print the output.
There should be common column between these two tables so that we compare
the data of table.
Inner Join: Gives matching records from both the tables.
Right Join: Right join return all records from right table with matching records from left
table.
8. Part 1 of 2 8
By Manjeet Singh Bargoti
Table Name: employee Table Name: incentive
EID ENAME Salary dept EID Incentivedate Incentiveamount
101 XYZ 10000 Science 101 01 Feb, 2013 10000
102 AAA 10000 Maths 104 01 Jan, 2013 10000
103 XXX 15000 Social 102 01 March, 2013 15000
55. Give me employee name and incentive date of the employee who has got
incentive.
Select employee.ENAME, incetive.Incentivedate from employee
Inner join incentive on
employee.EID = incentive.EID;
56. Give me the employee name and salary and incentive amount of those
employees who has receive incentive.
Select employee.ENAME, employee.Salary, incentive.Incentiveamount
From employee inner join incentive on
Employee.EID = incentive.EID;
57. Give me the employee name who got incentive on 1st March, 2013.
Select ENAME from employee
Where EID in (Select EID from incentive
Where incentivedate = “01 March. 2013”);
58. Give me the employee ID and incentive amount.
Select EID, incentiveamount from incentive;
59. Show me the dept name and incentive amount.
Select employee.dept, incentive.incentiveamount
From employee inner join incentive on
Employee.EID = incentive.EID;
60. Give me the incentive date who got the incentive 4500 to 6000.
Select incentivedate from incentive
Where incentiveamount between 4500 and 6000;
61. Give all the records from left table with matching records from right table.
Select * from employee
Left join incentive on
Employee.EID = incentive.EID;
62. Give me employee name and incentive amount for permanently work in
company.
Select employee.ENAME, incentive.incentiveamount
From employee left join incentive on
Employee.EID = incentive.EID;
63. Give me the employee name and salary and incentive amount of permanent
employee.
Select employee.ENAME, employee.Salary, incentive.incentiveamount
Form employee left join incentive on
Employee.EID = incentive.EID;
9. Part 1 of 2 9
By Manjeet Singh Bargoti
64. Give me the employee name and all records of right table.
Select employee.ENAME, incentive.incentiveamount
From employee right join incentive on
employee.EID = incentive.EID;
Table Name: T1 Table Name: T2 Table Name: T3
A B C A D E A G H I
65. Give me all records from left table T1 only matching records from table T3
and CGH.
Select T1.C, T3.G, T3.H
From T1 left join T3 on
T1.A = T3.A;
66. Give me all the records from T3 and only matching records from table T1 and
output should consist of I & B.
Select T3.I, T1.B
From T3 right join T1 on
T3.A = T1.A;
Primary key: It is unique plus not null. Per table there can be only one primary key.
Unique key: It is unique plus not null value. You can have more than one unique constrain
in the table.
Check: It will validate the data before the storing it, Check the quantity should be greater
than Zero, check salary > 0. You can put more than one constrain in one table.
Not Null: This constrain will not let you to store null value in a particular column. It can
be apply more than one in the table.
There are two ways to decide Primary Key:
Serogate Primary Key: This is forcefully added by the developer in order to
identify the record in unique.
Natural Primary key: Many times we create the column. We notice that certain
column will consist unique records in it. Like – phone number column, Email ID
etc.
Foreign Key: The main purpose of foreign key is to create relation between two tables.
In a particular table there can be more than one foreign key. Foreign Key can consist of
duplicate records in it.
10. Part 1 of 2 10
By Manjeet Singh Bargoti
Steps to create a table using Command Prompt:
Press Window + R and type cmd in run tab.
Now you will see a command prompt tab on your computer screen.
First Login with your database in command prompt (How to login in command
prompt, I already explained in starting of this tutorial).
Copy the path of MySQL folder present in XAMPP which is in C drive.
Paste the Path in command prompt and type username root and password blank
or if you give any password.
Now we will create a table for customer details:
Create table customer (
CID int AUTO_INCREAMENT, Primary Key,
CNAME varchar (20) not null,
LOCATION varchar (20) not null,
AGE int (3),
EMAIL varchar (30) unique,
);
Here varchar(), int() are datatypes.
We will learn in detail about creating database and table using Command Prompt
in Part 2. In Part 2 I will teach you how to insert data in table and how to get data
from table using command prompt.
Important Questions:
Q1. What is SQL Injection?
A. SQL Injection is one of the techniques uses by hackers to hack a website by injecting
SQL commands in data fields.
Q2. Explain the difference between DELETE, TRUNCATE and DROP commands?
A. Once delete operation is performed Commit and Rollback can be performed to retrieve
data. But after truncate statement, Commit and Rollback statement can’t be performed.
Where condition can be used along with delete statement but it can’t be used with
truncate statement. Drop command is used to drop the table or keys like primary, foreign
from a table.
Q3. What is the difference between Cluster and Non cluster Index?
A. A clustered index reorders the way records in the table are physically stored. There
can be only one clustered index per table. It make data retrieval faster. A non-clustered
index does not alter the way it was stored but creates a complete separate object within
the table. As a result insert and update command will be faster.
11. Part 1 of 2 11
By Manjeet Singh Bargoti
Q4. What is Union, minus and Interact commands?
A. MINUS operator is used to return rows from the first query but not from the second
query. INTERSECT operator is used to return rows returned by both the queries.
Q5. What’s the Difference between a Primary Key and a Unique Key?
A. Both primary key and unique key enforce uniqueness of the column on which they are
defined. But by default, the primary key creates a clustered index on the column, whereas
unique key creates a non-clustered index by default. Another major difference is that
primary key doesn’t allow NULLs, but unique key allows one NULL only.
In the Part 2 we will learn about DDL, DML, Normalization and CRUD
operation using PHP and MySQL.