Presented by,
Mr. Abhilash K
Database Architect, Livares Technologies
Introduction
About DBMS
A database management system (DBMS) is a software for
creating and managing databases. DBMS provides
users/programmers with a systematic way to create,
retrieve, update and manage data.
What is RDBMS
A type of DBMS in which the database is organized and
accessed according to the relationships between data
values. RDBMS are designed to take care of large amounts
of data and also the security of this data
The document discusses various SQL statements and functions used for managing databases and querying data. It provides the syntax for SQL statements like CREATE TABLE, INSERT, SELECT, UPDATE, DELETE and functions like COUNT, AVG, MIN, MAX, SUM to operate on data in database tables. It also covers statements for altering tables, joining tables, filtering rows with WHERE and HAVING clauses, removing duplicates with DISTINCT, and ordering results.
Consists of the explanations of the basics of SQL and commands of SQL.Helpful for II PU NCERT students and also degree studeents to understand some basic things.
The document discusses relational database management systems and the SQL language. It provides information on some key concepts:
1. Tables are the fundamental data structure in relational databases, organized as rows and columns. Each table has a unique name and columns must have unique names within the table.
2. SQL is the standard language used to communicate with relational databases to organize, manage and retrieve data. Key SQL commands include SELECT, INSERT, UPDATE, DELETE.
3. ALTER TABLE, CREATE TABLE, DROP TABLE, and other commands are used to define and modify database structure. Data types supported include numeric, date, text. Columns can be added, modified, or dropped from tables.
This document provides an overview of database concepts including creating, altering, and dropping databases and tables. It discusses data definition language (DDL) commands like CREATE, ALTER, DROP as well as data manipulation language (DML) commands like INSERT, SELECT, UPDATE, DELETE. It also covers database constraints, joins, functions for aggregation, strings, numbers, dates and more. The document is an introduction to core SQL concepts for a course on data management and database design.
SQL is a standard language for storing, manipulating and retrieving data in databases. It allows users to access and manipulate data in databases. Some key functions of SQL include executing queries against a database, retrieving data from a database, inserting, updating and deleting records in a database, and creating, altering and dropping database objects like tables.
This document provides information about SQL queries and joins. It begins by introducing SQL (Structured Query Language) which is used to communicate with databases and retrieve required information. It describes the basic CRUD (Create, Read, Update, Delete) functions of SQL. It then discusses different types of SQL queries - aggregate function queries, scalar function queries, and join queries. It provides the syntax and explanation of inner joins, outer joins (left, right, full) which are used to query data from multiple tables based on relationships between columns. The document is presented by Hammad, Bilal and Awais.
This document provides an introduction to SQL (Structured Query Language). It defines SQL as a standard language for accessing and manipulating databases. The key points covered include:
- SQL lets you perform queries against a database to retrieve, insert, update, and delete data. It can also be used to create and modify database structures.
- Common SQL commands covered are SELECT, INSERT, UPDATE, DELETE, CREATE TABLE, ALTER TABLE, DROP TABLE.
- Additional SQL concepts explained are data types, WHERE clauses, ORDER BY clauses, GROUP BY clauses, and JOIN operations.
- RDBMS systems like MySQL, SQL Server, Oracle, etc. use SQL to communicate with the databases they manage.
The document discusses various SQL statements and functions used for managing databases and querying data. It provides the syntax for SQL statements like CREATE TABLE, INSERT, SELECT, UPDATE, DELETE and functions like COUNT, AVG, MIN, MAX, SUM to operate on data in database tables. It also covers statements for altering tables, joining tables, filtering rows with WHERE and HAVING clauses, removing duplicates with DISTINCT, and ordering results.
Consists of the explanations of the basics of SQL and commands of SQL.Helpful for II PU NCERT students and also degree studeents to understand some basic things.
The document discusses relational database management systems and the SQL language. It provides information on some key concepts:
1. Tables are the fundamental data structure in relational databases, organized as rows and columns. Each table has a unique name and columns must have unique names within the table.
2. SQL is the standard language used to communicate with relational databases to organize, manage and retrieve data. Key SQL commands include SELECT, INSERT, UPDATE, DELETE.
3. ALTER TABLE, CREATE TABLE, DROP TABLE, and other commands are used to define and modify database structure. Data types supported include numeric, date, text. Columns can be added, modified, or dropped from tables.
This document provides an overview of database concepts including creating, altering, and dropping databases and tables. It discusses data definition language (DDL) commands like CREATE, ALTER, DROP as well as data manipulation language (DML) commands like INSERT, SELECT, UPDATE, DELETE. It also covers database constraints, joins, functions for aggregation, strings, numbers, dates and more. The document is an introduction to core SQL concepts for a course on data management and database design.
SQL is a standard language for storing, manipulating and retrieving data in databases. It allows users to access and manipulate data in databases. Some key functions of SQL include executing queries against a database, retrieving data from a database, inserting, updating and deleting records in a database, and creating, altering and dropping database objects like tables.
This document provides information about SQL queries and joins. It begins by introducing SQL (Structured Query Language) which is used to communicate with databases and retrieve required information. It describes the basic CRUD (Create, Read, Update, Delete) functions of SQL. It then discusses different types of SQL queries - aggregate function queries, scalar function queries, and join queries. It provides the syntax and explanation of inner joins, outer joins (left, right, full) which are used to query data from multiple tables based on relationships between columns. The document is presented by Hammad, Bilal and Awais.
This document provides an introduction to SQL (Structured Query Language). It defines SQL as a standard language for accessing and manipulating databases. The key points covered include:
- SQL lets you perform queries against a database to retrieve, insert, update, and delete data. It can also be used to create and modify database structures.
- Common SQL commands covered are SELECT, INSERT, UPDATE, DELETE, CREATE TABLE, ALTER TABLE, DROP TABLE.
- Additional SQL concepts explained are data types, WHERE clauses, ORDER BY clauses, GROUP BY clauses, and JOIN operations.
- RDBMS systems like MySQL, SQL Server, Oracle, etc. use SQL to communicate with the databases they manage.
Data Definition Language (DDL), Data Definition Language (DDL), Data Manipulation Language (DML) , Transaction Control Language (TCL) , Data Control Language (DCL) - , SQL Constraints
This document provides an introduction to structured query language (SQL). It outlines the objectives of learning SQL, which are to use SQL for data administration and data manipulation. The agenda covers SQL concepts like data types, constraints, database relationships, queries, and commands. It discusses SQL database objects and how to retrieve, customize, group and join data. It also covers inserting, updating, deleting data and working with tables, views, constraints, stored procedures and functions.
MySQL is a popular and freely available open-source relational database management system (RDBMS). It stores data in tables and relationships between data are also stored in tables. MySQL uses SQL and works on many operating systems. It has commands for data definition (CREATE, ALTER, DROP), data manipulation (SELECT, INSERT, UPDATE, DELETE), transaction control (COMMIT, ROLLBACK), and data access control (GRANT, REVOKE). Joins allow retrieving data from multiple tables by linking rows together. Common join types are inner joins, outer joins, and self joins.
SQL language includes four primary statement types: DML, DDL, DCL, and TCL. DML statements manipulate data within tables using operations like SELECT, INSERT, UPDATE, and DELETE. DDL statements define and modify database schema using commands like CREATE, ALTER, and DROP. DCL statements control user access privileges with GRANT and REVOKE. TCL statements manage transactions with COMMIT, ROLLBACK, and SAVEPOINT to maintain data integrity.
This document defines SQL data definition statements and basic SQL query structure. It discusses DDL statements like CREATE, ALTER, and DROP that are used to define and manage database structures. It also explains the typical components of an SQL query including the SELECT, FROM, and WHERE clauses. Finally, it outlines several set operations in SQL like UNION, UNION ALL, INTERSECT, and MINUS.
in this presentation the commands let you help to understand the basic of the database system software. how to retrieve data, how to feed data and manipulate it very efficiently by using this commands.
The document provides information on various SQL commands used to create and manage databases and tables. It explains how to use SHOW, CREATE DATABASE, USE, SHOW TABLES, CREATE TABLE, DESCRIBE, ALTER TABLE, SELECT, UPDATE, DELETE, INSERT, CREATE VIEW commands. It also discusses table constraints like NOT NULL, UNIQUE, PRIMARY KEY, FOREIGN KEY and provides examples of how to implement them in CREATE TABLE and ALTER TABLE statements.
1. The document provides information on database concepts like the system development life cycle, data modeling, relational database management systems, and creating and managing database tables in Oracle.
2. It discusses how to create tables, add, modify and delete columns, add comments, define constraints, create views, and perform data manipulation operations like insert, update, delete in Oracle.
3. Examples are provided for SQL statements like CREATE TABLE, ALTER TABLE, DROP TABLE, CREATE VIEW, INSERT, UPDATE, DELETE.
The document discusses how to use Oracle's Data Definition Language (DDL) to define database objects like tables, views, indexes, and sequences. It provides the syntax for creating these objects using commands like CREATE, ALTER, and DROP. Examples are given for creating a table with various constraints, altering a table, creating views with subqueries, and using sequences to generate primary keys. The key DDL commands, data types, naming conventions, constraints, and how to populate and modify tables are summarized.
This document provides an overview of SQL (Structured Query Language) including what it is, what it can do, and some key SQL statements. SQL is a standard language for accessing and manipulating databases and allows users to retrieve, insert, update, and delete data. The document describes common statements like SELECT, UPDATE, DELETE, and INSERT and provides examples of basic usage.
This document summarizes the main DML (Data Manipulation Language) commands used for editing data in SQL: INSERT for adding new rows, UPDATE for changing existing rows, and DELETE for removing rows. It provides the syntax and examples for each command, including using default values, assigning null values, and specifying conditions with WHERE clauses.
SQL - Structured query language introductionSmriti Jain
SQL is a language used to define, manipulate, and control relational databases. It has four main components: DDL for defining schemas; DML for manipulating data within schemas; DCL for controlling access privileges; and DQL for querying data. Some key SQL concepts covered include data definition using CREATE, ALTER, DROP statements; data manipulation using SELECT, INSERT, UPDATE, DELETE; and joining data across tables using conditions. Advanced topics include views, aggregation, subqueries, and modifying databases.
This document provides an overview of SQL programming including:
- A brief history of SQL and how it has evolved over time.
- Key SQL fundamentals like database structures, tables, relationships, and normalization.
- How to define and modify database structures using commands like CREATE, ALTER, DROP.
- How to manipulate data using INSERT, UPDATE, DELETE, and transactions.
- How to retrieve data using SELECT statements, joins, and other techniques.
- How to aggregate data using functions like SUM, AVG, MAX, MIN, and COUNT.
- Additional topics covered include subqueries, views, and resources for further learning.
The document discusses various SQL concepts including creating and dropping databases and tables, data types, SQL statements for inserting, updating and deleting records, joining tables, and aggregation functions. It provides syntax and examples for commands like CREATE DATABASE, CREATE TABLE, INSERT, UPDATE, DELETE, SELECT, WHERE, GROUP BY, UNION and functions like COUNT, SUM, AVG, MAX, MIN. The document is meant as a guide for students to learn fundamental SQL concepts through explanations, syntax and hands-on activities like creating a table.
The document discusses data manipulation language (DML) statements in Oracle such as INSERT, UPDATE, DELETE, and MERGE. It provides examples of using each statement to add, modify, remove, and merge rows in database tables. It also covers transactions, locking, and maintaining data integrity with constraints when using DML statements.
SQL is a standard language for accessing and manipulating databases. It allows users to perform functions like querying data, inserting records, updating records, and deleting records. The main SQL statements are SELECT, INSERT, UPDATE, DELETE, CREATE, ALTER, and DROP. SQL also includes clauses like WHERE, ORDER BY, GROUP BY and JOIN that allow users to filter and sort query results. Common data definition language statements are used to create and modify database structures like tables, indexes, and relationships.
This document provides an overview of databases and SQL. It begins by defining what a database is and the different types, including relational and non-relational databases. It then explains what SQL is and how it is used to perform CRUD operations on relational databases. The document outlines database structure and what tables are. It also describes key SQL concepts like data types, commands, queries, constraints, joins and more.
This document provides an overview of SQL (Structured Query Language) including key statements and concepts. It discusses the different types of SQL statements including DDL for definitions, DML for data manipulation, and DCL for access control. It also summarizes important SQL statements and clauses like SELECT, INSERT, UPDATE, DELETE, WHERE, GROUP BY, HAVING, ORDER BY and more. The document is intended as an introduction to the SQL language and relational database concepts.
Data Definition Language (DDL), Data Definition Language (DDL), Data Manipulation Language (DML) , Transaction Control Language (TCL) , Data Control Language (DCL) - , SQL Constraints
This document provides an introduction to structured query language (SQL). It outlines the objectives of learning SQL, which are to use SQL for data administration and data manipulation. The agenda covers SQL concepts like data types, constraints, database relationships, queries, and commands. It discusses SQL database objects and how to retrieve, customize, group and join data. It also covers inserting, updating, deleting data and working with tables, views, constraints, stored procedures and functions.
MySQL is a popular and freely available open-source relational database management system (RDBMS). It stores data in tables and relationships between data are also stored in tables. MySQL uses SQL and works on many operating systems. It has commands for data definition (CREATE, ALTER, DROP), data manipulation (SELECT, INSERT, UPDATE, DELETE), transaction control (COMMIT, ROLLBACK), and data access control (GRANT, REVOKE). Joins allow retrieving data from multiple tables by linking rows together. Common join types are inner joins, outer joins, and self joins.
SQL language includes four primary statement types: DML, DDL, DCL, and TCL. DML statements manipulate data within tables using operations like SELECT, INSERT, UPDATE, and DELETE. DDL statements define and modify database schema using commands like CREATE, ALTER, and DROP. DCL statements control user access privileges with GRANT and REVOKE. TCL statements manage transactions with COMMIT, ROLLBACK, and SAVEPOINT to maintain data integrity.
This document defines SQL data definition statements and basic SQL query structure. It discusses DDL statements like CREATE, ALTER, and DROP that are used to define and manage database structures. It also explains the typical components of an SQL query including the SELECT, FROM, and WHERE clauses. Finally, it outlines several set operations in SQL like UNION, UNION ALL, INTERSECT, and MINUS.
in this presentation the commands let you help to understand the basic of the database system software. how to retrieve data, how to feed data and manipulate it very efficiently by using this commands.
The document provides information on various SQL commands used to create and manage databases and tables. It explains how to use SHOW, CREATE DATABASE, USE, SHOW TABLES, CREATE TABLE, DESCRIBE, ALTER TABLE, SELECT, UPDATE, DELETE, INSERT, CREATE VIEW commands. It also discusses table constraints like NOT NULL, UNIQUE, PRIMARY KEY, FOREIGN KEY and provides examples of how to implement them in CREATE TABLE and ALTER TABLE statements.
1. The document provides information on database concepts like the system development life cycle, data modeling, relational database management systems, and creating and managing database tables in Oracle.
2. It discusses how to create tables, add, modify and delete columns, add comments, define constraints, create views, and perform data manipulation operations like insert, update, delete in Oracle.
3. Examples are provided for SQL statements like CREATE TABLE, ALTER TABLE, DROP TABLE, CREATE VIEW, INSERT, UPDATE, DELETE.
The document discusses how to use Oracle's Data Definition Language (DDL) to define database objects like tables, views, indexes, and sequences. It provides the syntax for creating these objects using commands like CREATE, ALTER, and DROP. Examples are given for creating a table with various constraints, altering a table, creating views with subqueries, and using sequences to generate primary keys. The key DDL commands, data types, naming conventions, constraints, and how to populate and modify tables are summarized.
This document provides an overview of SQL (Structured Query Language) including what it is, what it can do, and some key SQL statements. SQL is a standard language for accessing and manipulating databases and allows users to retrieve, insert, update, and delete data. The document describes common statements like SELECT, UPDATE, DELETE, and INSERT and provides examples of basic usage.
This document summarizes the main DML (Data Manipulation Language) commands used for editing data in SQL: INSERT for adding new rows, UPDATE for changing existing rows, and DELETE for removing rows. It provides the syntax and examples for each command, including using default values, assigning null values, and specifying conditions with WHERE clauses.
SQL - Structured query language introductionSmriti Jain
SQL is a language used to define, manipulate, and control relational databases. It has four main components: DDL for defining schemas; DML for manipulating data within schemas; DCL for controlling access privileges; and DQL for querying data. Some key SQL concepts covered include data definition using CREATE, ALTER, DROP statements; data manipulation using SELECT, INSERT, UPDATE, DELETE; and joining data across tables using conditions. Advanced topics include views, aggregation, subqueries, and modifying databases.
This document provides an overview of SQL programming including:
- A brief history of SQL and how it has evolved over time.
- Key SQL fundamentals like database structures, tables, relationships, and normalization.
- How to define and modify database structures using commands like CREATE, ALTER, DROP.
- How to manipulate data using INSERT, UPDATE, DELETE, and transactions.
- How to retrieve data using SELECT statements, joins, and other techniques.
- How to aggregate data using functions like SUM, AVG, MAX, MIN, and COUNT.
- Additional topics covered include subqueries, views, and resources for further learning.
The document discusses various SQL concepts including creating and dropping databases and tables, data types, SQL statements for inserting, updating and deleting records, joining tables, and aggregation functions. It provides syntax and examples for commands like CREATE DATABASE, CREATE TABLE, INSERT, UPDATE, DELETE, SELECT, WHERE, GROUP BY, UNION and functions like COUNT, SUM, AVG, MAX, MIN. The document is meant as a guide for students to learn fundamental SQL concepts through explanations, syntax and hands-on activities like creating a table.
The document discusses data manipulation language (DML) statements in Oracle such as INSERT, UPDATE, DELETE, and MERGE. It provides examples of using each statement to add, modify, remove, and merge rows in database tables. It also covers transactions, locking, and maintaining data integrity with constraints when using DML statements.
SQL is a standard language for accessing and manipulating databases. It allows users to perform functions like querying data, inserting records, updating records, and deleting records. The main SQL statements are SELECT, INSERT, UPDATE, DELETE, CREATE, ALTER, and DROP. SQL also includes clauses like WHERE, ORDER BY, GROUP BY and JOIN that allow users to filter and sort query results. Common data definition language statements are used to create and modify database structures like tables, indexes, and relationships.
This document provides an overview of databases and SQL. It begins by defining what a database is and the different types, including relational and non-relational databases. It then explains what SQL is and how it is used to perform CRUD operations on relational databases. The document outlines database structure and what tables are. It also describes key SQL concepts like data types, commands, queries, constraints, joins and more.
This document provides an overview of SQL (Structured Query Language) including key statements and concepts. It discusses the different types of SQL statements including DDL for definitions, DML for data manipulation, and DCL for access control. It also summarizes important SQL statements and clauses like SELECT, INSERT, UPDATE, DELETE, WHERE, GROUP BY, HAVING, ORDER BY and more. The document is intended as an introduction to the SQL language and relational database concepts.
This document provides an overview of SQL commands and functions. It covers topics such as creating and manipulating databases and tables, retrieving and modifying data, joining tables, and string operations. Some key points include:
- SQL commands are grouped into DDL, DML, DCL, and DQL for defining, manipulating, controlling, and querying databases.
- Tables can be created with or without constraints and records can be inserted, selected, updated, and deleted from tables.
- Joins allow data to be retrieved from multiple tables. Functions like COUNT, AVG, MIN, MAX, and SUM perform calculations on data.
- String functions allow manipulation of text, including uppercase, lowercase, substring,
The document discusses various components and concepts related to database management systems (DBMS). It defines a database as a collection of related data organized for easy access, management, and updating. It describes the main components of a DBMS as hardware, software, data, procedures, and database access language. It also discusses key DBMS concepts like data definition language, data manipulation language, functions, constraints, and having clause.
SQL -Beginner To Intermediate Level.pdfDraguClaudiu
SQL is a programming language used for managing and manipulating relational databases. The document discusses SQL concepts like databases, tables, data types, queries, joins, constraints, views, stored procedures, and query optimization techniques. It provides examples of creating databases and tables, different types of joins, constraints, aggregate functions, and subqueries. The key difference between views and stored procedures is that views return data and stored procedures can accept parameters and modify data.
SQL.pptx for the begineers and good knowPavithSingh
SQL is a standard language for storing, manipulating and retrieving data in relational databases. It allows users to define database structures, create tables, establish relationships between tables and query data. Popular uses of SQL include inserting, updating, deleting and selecting data from database tables. SQL is widely used across industries for managing large datasets efficiently in relational database management systems like MySQL, Oracle and SQL Server.
SQL is a database sublanguage used to query and modify relational databases. It consists of two categories of statements: DDL (data definition language) used to define database schema objects like tables and indexes, and DML (data manipulation language) used to manipulate data within those objects. Oracle's SQL*Plus tool allows users to enter, edit, run and format SQL statements against an Oracle database. Common Oracle database objects include tables, views, indexes, triggers, and users. SQL statements like CREATE TABLE, ALTER TABLE, INSERT, UPDATE, DELETE and SELECT are used to define and manipulate data in database tables.
Database questions and answers document containing:
1. SQL queries for fetching data from tables using SELECT and WHERE clauses.
2. Joins to retrieve data from multiple tables using SELECT, FROM, and WHERE clauses.
3. Differences between unique key and primary key including allowing null values and number allowed per table.
4. Uses and types of indexes to improve query performance including on single or multiple columns.
5. Purpose and examples of foreign key constraints to maintain referential integrity.
6. Aggregate functions like AVG, COUNT, MAX used in queries.
SQL is a language used to store, retrieve, and manage data in relational database management systems. It contains commands like SELECT, INSERT, UPDATE, DELETE to query and manipulate data. SQL also allows functions, operators, transactions, and other capabilities to ensure data integrity and security. Integrity constraints like primary keys and foreign keys help maintain relational integrity between tables.
This document provides information about SQL and database management systems. It discusses:
- SQL is a standard language for querying, manipulating, and defining data in databases. It was developed by IBM in the 1970s.
- SQL can be used to perform functions like retrieving data from a database, inserting new records, updating existing records, and deleting records.
- The main components of SQL are DDL, DML, DCL, and DQL which allow creating, modifying and deleting database structures, manipulating data, controlling access to data, and querying data respectively.
- Common SQL statements are discussed including SELECT, INSERT, UPDATE, DELETE, ALTER, CREATE TABLE, and DROP TABLE. Data types and
SQL (Structured Query Language) is a standard language for accessing and manipulating databases. It allows users to execute queries against a database, retrieve data from a database, insert records into a database, update records in a database, and delete records from a database. Common SQL statements include SELECT to retrieve data, INSERT to add data, UPDATE to modify data, DELETE to remove data, and CREATE/ALTER to manage tables and databases.
The document provides an overview of database architecture and basic concepts such as what a database is, structured query language (SQL), and stored procedures. A database allows for structured storage and retrieval of complex data. SQL is used to manipulate and retrieve data from databases. Stored procedures are programs stored in databases that perform specific tasks like validating arguments. They provide benefits like improved performance and protection of database integrity.
The document provides an introduction to MySQL and relational database management systems. It discusses what a database and RDBMS are, common RDBMS terminology like tables, columns, rows, keys, and indexes. It also covers how to install and use MySQL, including creating databases and tables, and performing basic CRUD (create, read, update, delete) operations using SQL statements. The document is aimed at getting readers started with the MySQL database system.
Introduction to Structured Query Language (SQL).pptAshwini Rao
The document provides an overview of SQL (Structured Query Language). It discusses the basic commands and functions of SQL for data administration and manipulation. The key topics covered include creating databases and tables, inserting, updating, and deleting data, filtering queries with conditions, joining tables, and aggregating data with functions. The document also summarizes the main SQL clauses, data types, constraints and how to work with views.
This document provides an overview of MySQL including definitions of database, data definition language, data manipulation language, data control language, transaction control language, data types, table creation, constraints, joins, and views. It defines what a database is and explains DDL for defining structures, DML for manipulating data, DCL for controlling access, and TCL for transactions. It also covers data types, primary keys, foreign keys, relationships, and SQL syntax.
SQL (Structured Query Language) is a standard programming language used to manage data in relational database systems. SQL is used to perform tasks like querying data, inserting, updating, and deleting data. The core SQL statements are SELECT, UPDATE, DELETE, and INSERT. The SELECT statement is used to query data from one or more tables, the WHERE clause adds conditions to a SELECT, and DISTINCT returns only unique results.
The document provides information about various SQL concepts like views, triggers, functions, indexes, and joins. It defines views as virtual tables created by queries on other tables. Triggers are blocks of code that execute due to data modification language statements on tables. Functions allow reusable code and improve clarity. Indexes speed up searches by allowing fast data retrieval. Joins combine data from two or more tables based on relationships between columns. Stored procedures are SQL statements with an assigned name that are stored for shared use.
This document provides an overview of SQL (Structured Query Language) and relational database concepts. It defines SQL, RDBMS, and DBMS. It explains the basic SQL statements for creating databases and tables, inserting, updating, deleting and selecting data. It also covers SQL operators like AND, OR, and NOT for filtering query results. The key points covered are:
- SQL is a standardized language used to manage and query relational database data.
- An RDBMS uses a table structure to store related data elements and ensure data integrity.
- Common SQL statements are CREATE, INSERT, SELECT, UPDATE, DELETE to manage database objects and data.
- WHERE, AND, OR, and NOT clauses are
This document provides an introduction to SQL (Structured Query Language) for manipulating and working with data. It covers SQL fundamentals including defining a database using DDL, working with views, writing queries, and establishing referential integrity. It also discusses SQL data types, database definition, creating tables and views, and key SQL statements for data manipulation including SELECT, INSERT, UPDATE, and DELETE. Examples are provided for creating tables and views, inserting, updating, and deleting data, and writing queries using functions, operators, sorting, grouping, and filtering.
Supervised machine learning uses labeled training data to build models that can predict outputs. There are two main types: regression predicts continuous variables, while classification predicts categorical variables. Supervised learning algorithms include linear regression, which finds a linear relationship between variables, and logistic regression or decision trees for classification. The process involves collecting labeled data, training an algorithm on part of the data, and evaluating its accuracy on test data.
This document discusses the importance of developing secure mobile applications. It outlines best practices for secure app development, including implementing secure coding practices, encrypting sensitive data, and conducting security testing. The document also discusses the role of user education and awareness in overall app security. Developing secure apps is essential to protect user data, maintain trust with users, and prevent security breaches and data leaks.
The document discusses micro-frontend architecture, which divides the frontend UI into smaller, semi-independent applications. It covers the core ideas like technological independence and faster development. Integration approaches include server-side templates, build-time integration using packages, and runtime integration with iframes or JavaScript. Challenges include complexity, coordination, and performance, which can be overcome with standardization and DevOps practices. Popular companies using microfrontends are IKEA, Upwork, and Spotify.
Presented by,
Ms. Anjali K G
Quality Assurance Engineer, Livares Technologies
Java open source desktop application
Designed to analyze and measure performance of web applications
JMeter has friendly GUI
Platform independent
Full multithreading framework
Visualize test result
Easy installation
Support multi protocol
Record and play back
Can be integrated with selenium for automated testing
This document provides an introduction to Angular JS, including its features and architecture. Angular JS is a front end JavaScript framework that uses MVC architecture. It allows for code organization, increases productivity, and has features like data binding and built-in unit testing. The core components of Angular include modules, components, and services. Modules provide context and organization. Components define views using templates. Services define application logic and data. Routing is also covered, allowing navigation between different views and paths.
This document provides an overview of quantum computing. It discusses how quantum computing takes advantage of quantum mechanics to perform calculations exponentially faster than classical computers. Some key topics covered include the need for quantum computers to solve optimization and machine learning problems, basic concepts like qubits and quantum gates, as well as recent achievements in building quantum computers with over 50 qubits. The document also notes some current limitations like the challenges of maintaining quantum states and the need to isolate systems from noise.
The document discusses the philosophy and principles of Just-in-Time (JIT) manufacturing. It describes how JIT originated in Japan after WWII to maximize efficient use of limited resources. Toyota was an early adopter of JIT in the 1970s. The key aspects of JIT are eliminating waste and continuous process improvement by producing only what is needed when it is needed with perfect quality and minimal lead times. JIT aims to reduce setup times, inventory levels, and transportation. While reducing costs, it also increases responsiveness and quality but requires strong supplier relationships and commitment to be effective long-term.
Bitcoin is a decentralized digital currency that was created in 2009. It functions without a central bank or single administrator through a peer-to-peer network and blockchain technology. Bitcoin is mined through the use of computer processing power to verify transactions and add them to the blockchain. Miners are rewarded with newly minted bitcoins and transaction fees for their work maintaining the integrity of the blockchain. There will only ever be 21 million bitcoins created as the block reward gets cut in half approximately every four years.
Presented by,
Mr. Blesson Joseph
Senior Software Engineer, Livares Technologies
What is data mining?
Data mining is the process of analyzing data and summarizing it to produce useful information.
Queries based on SQL, a database programming language, are used to answer basic questions about data.
But, as the collection of data grows in a database, the amount of data can easily become overwhelming.
A data warehouse is a collection of databases that work together. A data warehouse makes it possible to integrate data from multiple databases, which can give new insights into the data.
The ultimate goal of a database is not just to store data, but to help businesses make decisions based on that data.
Goal of Data Mining
The overall goal of the data mining
process is to extract information from a
data set and transform it into an
understandable structure for further use.
Data mining is the computing process of
discovering patterns in large data sets
involving methods.
These patterns can be used for predictive
analytics.
Presented by,
Ms. Nandana S V
Team Lead, Sr Software Engineer, Livares Technologies
Facade design pattern
Facade is a part of Gang of Four design pattern (23 others).
As the name suggests, it means the face of the building.
The people walking past the road can only see this glass face of the building.
They do not know anything about it, the wiring, the pipes and other complexities.
It hides all the complexities of the building and displays a friendly face.
Facade design pattern
Same goes for the Facade Design Pattern. It hides the complexities of the system and provides an interface to the client from where the client can access the system.
Presented by,
Ms. Anjali K G
Quality Assurance Engineer, Livares Technologies
Manual Testing: Process of testing an application
manually for defects. It requires a tester to play the role
of an end user
Automation Testing: It is technique by using special
software to control the execution of tests and the
comparison of actual results with predicted results
Testing tools Ex: QTP, Winrunner, Selenium etc
Presented by Mr. Arunsankar S
Sr Software Developer, Livares Technologies
What is screen-less display?
Screen-less display is the present evolving technology in the field of the computer-enhanced technologies.
It is going to be the one of the greatest technological development in the future years.
Several patents are still working on this new emerging technology which can change the whole spectacular view
of the screen-less displays.
Screen-less display technology has the main aim of displaying (or) transmitting the information without any help
of the screen (or) the projector.
Screen-less videos describe systems for transmitting visual information from a video source without the use of
the screen.
1. The document provides an introduction to machine learning, explaining how it works through examples of classifying songs based on an individual's music tastes and recognizing friends in tagged photos.
2. Key machine learning concepts are defined, including supervised learning, unsupervised learning, and generative adversarial networks (GANs). Examples are given of applications like recommending new songs, detecting credit card fraud, and generating fake images.
3. The popularity of machine learning is attributed to the huge amounts of data now available for training models, and examples are given of how Uber and other companies use machine learning applications in areas like predictive modeling.
Presented by Mr. Dinesh KS
Software Developer, Livares Technologies
Introduction
Object detection is a computer technology related to computer vision and image processing that
deals with detecting instances of semantic objects of a certain class (such as humans, buildings, or
cars) in digital images and videos.
Face detection is a computer technology being used in a variety of applications that identifies
human faces in digital images.
Smart Water Distribution Management System
Water Meter + Automated Meter Reading (AMR) + Advanced Metering Infrastructure (AMI)
Smart Water Meter, a flagship product of Troncart an
IoT & Embedded System service provider co-founded by
Livares Technologies Pvt Ltd and Tachlog Pvt Ltd.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
4. Introduction
About DBMS
A database management system (DBMS) is a software for
creating and managing databases. DBMS provides
users/programmers with a systematic way to create,
retrieve, update and manage data.
What is RDBMS
A type of DBMS in which the database is organized and
accessed according to the relationships between data
values. RDBMS are designed to take care of large amounts
of data and also the security of this data
4
5. RDBMS Have
Tables (relations) that are two dimensional
The tables have rows (records or objects)
The tables have columns (fields or attributes)
The data stored is simple data such as integers, real
numbers, dates or string values
All table columns depend on a primary key to identify the
column
Database – collection of Tables and other objects.
5
6. SQL
Structured Query Language
SQL Overview
➔ SQL is language component of the RDBMS
➔ SQL essentially has four components
SQL Has 4 essential components
➔ The data definition language : DDL
➔ The data manipulation language : DML
➔ The data control language : DCL
➔ The transaction control language : TCL
6
7. SQL – Components 1
DDL – Statements used to define the database structure
or schema
➔ CREATE – Creates objects in the database
➔ ALTER – Alters the structure of the database
➔ DROP – Deletes the objects form the database
➔ TRUNCATE – Remove all records from a table, including all spaces
allocated for the records are removed
DML – Statements used to managing data with in schema
objects
➔ SELECT – Retrieve data from the database
➔ INSERT – Insert data into a table
➔ UPDATE - Updates existing data within a table
➔ DELETE - Deletes records from a table,the space for the records
remains
7
8. SQL – Components 2
DCL – Statement used for data control
➔ GRANT – Give user’s access privileges to database
➔ REVOKE – Withdraw access privileges given the GRANT command
TCL – Manages the changes made by DML
statements
➔ COMMIT – Saves the work done
➔ SAVEPOINT – Identify a point in transaction to which you
can later rollback
➔ ROLLBACK – Restore database to original since the last
➔ SET TRANSACTION – Change transaction options like
isolation level and what rollback segment to use
8
9. Database Table
Definition
➔ A two dimensional arrangements of rows and columns
used for holding data
A Table
➔ Has unique name
➔ Consists of rows and columns
➔ All values in one column have the same data type
➔ Every column can be used in an SQL statement
9
10. Creating Table
Syntax
CREATE TABLE table_name
(column1 datatype null/not null,
column2 datatype null/not null,
…)
Each column must have a datatype. The column should
either be defined as "null" or "not null" and if this value is
left blank, the database assumes "null" as the default
10
11. Creating Table
Specification
➔ NULL
➔ NOT NULL
➔ NOT NULL WITH DEFAULT
When creating a table,one of these attributes is specified for a column
NULL v/s NOT NULL
➔ NULL - Can be interpreted as unknown or not available
Null doesn’t mean empty (blank) or 0 (Zero)
➔ NOT NULL - The user must provide values while inserting a
row (0 or blank is allowed for these columns)
11
12. Creating Table
NOT NULL WITH DEFAULT
The default value is stored,when a row is inserted without a specified
value for this column.
The default value is
Zero (0) for numeric data fields
Blank [empty] for character data fields
Current date for DATE fields
12
13. Data Types
Common Data Types in MySQL
char varchar text bigint binary
blob bit int date datetime
decimal enum float numeric ntext
nvarchar nchar real double
mediumtext smallinttimestamp
datetime(x)
time
tinyintjson
13
15. Integrity Constraints
Primary Key
➔ A primary key is a single field or combination of fields
that uniquely defines a record
➔ A table can have only one primary key
➔ A primary key can be defined in either a CREATE TABLE
statement or an ALTER TABLE statement
15
16. Integrity Constraints
Foreign Key
➔ A foreign key means that values in one table must also
appear in another table
➔ The foreign key in the child table will generally
reference a primary key in the parent table
➔ A foreign key can be defined in either a CREATE TABLE
statement or an ALTER TABLE statement
16
17. Integrity Constraints
Unique Key
➔ A unique constraint is a single field or combination of
fields that uniquely defines a record.
➔ Some of the fields can contain null values as long as
the combination of values is unique.
➔ A unique constraint can be defined in either a CREATE
TABLE statement or an ALTER TABLE statement
17
18. Integrity Constraints
What is the difference between Primary Key and Unique
Key?
18
Primary Key Unique Constraint
None of the fields that are
part of the primary key can
contain a null value
Some of the fields that are
part of the unique
constraint can contain null
values as long as the
combination of values is
unique
19. Integrity Constraints
NOT NULL
➔ NOT NULL constraints are in-line constraints that
indicate that a column can not contain NULL values
CHECK
➔ Check constraints validate that values in a given
column meet a specific criteria
19
20. IDE/Tools
MySQL Server Tools
➔ Toad for MySQL
➔ SQL Yog
➔ phpMyAdmin
➔ MySQL Administrator
➔ MySQL Query Browser
➔ MySQL WorkBench
20
21. Structure of SQL Queries
SELECT - column names / arithmetic expressions / literals
/ scalar functions / column functions
FROM - table names or view names
WHERE - conditions
GROUP BY - column names
HAVING - conditions
ORDER BY - column names
21
22. Table Aliases
Table Alias
➔ The use of table aliases means to rename a table in a
particular SQL statement
➔ The renaming is a temporary change
➔ The actual table name does not change in the
database
22
23. Comparison Operators
In the WHERE clause
➔ Equal =
➔ Not Equal != or <>
➔ Less <
➔ Less or Equal < =
➔ Greater >
➔ Greater or Equal > =
23
26. Distinct
The DISTINCT clause
➔ Allows you to remove duplicates from the result set
➔ The DISTINCT clause can only be used with select
statements.
The syntax
➔ SELECT DISTINCT column_name FROM table_name
26
27. Table Joins
JOIN
A join is used to combine rows from multiple tables
Different types of joins
➔ INNER JOIN
➔ OUTER JOIN
➢ LEFT JOIN
➢ RIGHT JOIN
➢ FULL JOIN
➔ CARTESIAN JOIN
27
28. WHERE Clause
WHERE
The WHERE clause allows you to filter the results from an
SQL statement
E.g.
SELECT *
FROM supplier
WHERE supplier_name = ‘ABC’
28
29. GROUP Functions
Group functions
Return results based on groups of rows, rather than on
single rows
Main Group functions
➔ COUNT
➔ SUM
➔ MIN
➔ MAX
➔ AVG
29
30. GROUP Functions
COUNT function - returns the number of rows in a query
SELECT COUNT(expression) FROM table_name;
SUM Function - returns the summed value of an
expression
SELECT SUM(expression ) FROM table_name;
MIN Function - returns the minimum value of an
expression
SELECT MIN(expression ) FROM table_name;
MAX function - returns the maximum value of an
expression
SELECT MAX(expression ) FROM table_name;
AVG Function - returns the average value of an expression
SELECT AVG(expression) FROM table_name;
30
31. Grouping
GROUP BY Clause
Can be used in a SELECT statement to collect data
across multiple records and group the results by one or
more columns
The syntax
SELECT column1,column2,
aggregate_function(expression)
FROM tables
WHERE predicates
GROUP BY column1, column2;
31
32. Having Clause
HAVING clause
➔ Used in combination with the GROUP BY clause.
➔ It can be used in a SELECT statement to filter the
records that a GROUP BY returns.
The syntax :
SELECT column1, column2, ... column_n,
aggregate_function (expression)
FROM tables
WHERE predicates
GROUP BY column1, column2, ... column_n
HAVING condition1 ... condition_n;
32
33. ORDER BY Clause
ORDER BY
Allows to sort the records in your result set
The ORDER BY clause can only be used in SELECT
statements
The syntax :
SELECT columns FROM table
WHERE predicate
ORDER BY column ASC/DESC;
ASC indicates ascending order. (default)
DESC indicates descending order.
33
34. UNION and UNION ALL
UNION
➔ Allows to combine the result sets of 2 or more "select"
queries
➔ It removes duplicate rows between the various
"select" statements
➔ Each SQL statement within the UNION query must
have the same number of fields in the result sets with
similar data types
The syntax :
Select field1, field2, . field_n From tables
UNION
Select field1, field2, . field_n From tables;
34
35. UNION and UNION ALL
UNION ALL
➔ Allows to combine the result sets of 2 or more "select“
queries
➔ It returns all rows (even if the row exists in more than
one of the "select" statements)
➔ Each SQL statement within the UNION ALL query
must have the same number of fields in the result
sets with similar data types
The syntax :
Select field1, field2, . field_n From tables
UNION ALL
Select field1, field2, . field_n From tables;
35
36. Sub Query
Subquery
Is a query within a query [SELECT]
Different Types
➔ Stand alone [independent existence]
➔ Co-related [dependent on outer select]
36
37. INSERT, UPDATE and DELETE
INSERT - Allows to insert a single record or multiple
records into a table.
INSERT INTO table (column-1, column-2, ... column-n)
VALUES (value-1, value-2, ... value-n);
UPDATE - Allows to update a single record or multiple
records in a table.
UPDATE table SET column = expression
WHERE predicate;
DELETE - Allows to delete a single record or multiple
records from a table.
DELETE FROM table WHERE predicate;
Note : “i-am-a-dummy” configuration
37
38. Database Design-Thump Rule
A table generally should have an identifier.
A table should store only data for a single type of entity.
A table should avoid nullable columns.
Table should not have repeating values or columns.
Keep columns as short as possible. e.g. Use int for bigint
38
41. Normalization
Normalizing a logical database design involves using
formal methods to separate the data into multiple, related
tables
A greater number of narrow tables (with fewer columns)
is characteristic of a normalized database
41
42. Benefits of Normalization
Faster sorting and index creation.
A larger number of clustered indexes.
Narrower and more compact indexes.
Fewer indexes per table, which improves the performance
of INSERT, UPDATE, and DELETE statements.
Fewer null values and less opportunity for inconsistency,
which increase database compactness.
42
43. INDEX
As the name indicates, indexes are used to speed up the
SELECT queries.
Types :
➔ Clustered : Created by default when a primary key is
created on the table.
➔ Non Clustered [Secondary] : All indexes other than the
clustered index are known as secondary indexes.
● Restrictions :
✔ A table can contain a maximum of 64 secondary indexes.
✔ A maximum of 16 columns only permitted for multicolumn
indexes.
43
44. INDEX
Disadvantages :
✔ The index slows down the speed of writing queries, such
as INSERT, UPDATE and DELETE. So more number of
indexes will lead to sluggishness of write operations.
✔ when we create index, it takes up disk space. the index
file would grow much more quickly than the data file.
44
45. Performance Tuning
EXPLAIN EXTENDED SELECT *
FROM stray_intakes
WHERE nid = 1209159 AND gid = 464;
table
➔ The table to which the row of output refers.
45
46. Performance Tuning
type
The join type. Possible join types are listed below,
ranked fastest to slowest:
➔ system - The table is a system table with only one row.
➔ const - The table has at most one matching row. A const
query is fast because the table is read only once.
➔ eq_ref - No more than one row will be read from this table.
This type is used when all columns of an index are used in
the query, and the index is UNIQUE or a PRIMARY KEY.
➔ ref - All matching rows will be read from this table. This is
used when an index is neither UNIQUE nor a PRIMARY.
46
47. Performance Tuning
➔ range - Only rows in a given range will be retrieved from
this table, using an index to select the rows.
➔ index - A full scan of the index will be performed for each
combination of rows from previous tables. This is the
same as an ALL join type except only the index is
scanned.
➔ ALL - A full scan of the table will be performed for each
combination of rows from previous tables. ALL joins
should be avoided by adding an index.
47
48. Performance Tuning
possible_keys
Lists which indexes MySQL could use to find the rows
in this table. When there are no relevant indexes,
possible_keys is NULL. This indicates that you can improve
the performance of your query by adding an index.
key
Lists the actual index that MySQL chose. It is NULL if
no index was chosen.
rows
Lists the number of rows that MySQL needs to
examine from the table to execute the query.
48