Introduction to SQL_02 lecture with English language and Persian Translation. This lecture is for absolutely beginners. This is the ninth lecture in database one.
A stored procedure is a subroutine available to applications that access a relational database. Extensive or complex SQL processing is moved into stored procedures to improve performance. Stored procedures offer advantages like improved security, reduced network traffic, and easier maintenance compared to embedding SQL statements in an application. They allow parameters to be passed in and support flow control structures like IF/THEN clauses.
The document provides guidelines for optimizing SQL and PL/SQL code for performance. It discusses best practices for using indexes like creating them on frequently queried columns and avoiding functions on indexed columns. Other topics covered include using EXISTS instead of JOINs when possible, avoiding DISTINCT, and placing filters in the WHERE clause instead of HAVING. Modular code design, avoiding negatives and LIKE patterns, and letting the optimizer do its work are also recommended. The goal is to help programmers write efficient code by understanding query execution and tuning techniques.
1. The document describes the prerequisites for setting up output in Excel using PL/SQL with XML, including designing an Excel layout, defining a stored procedure and concurrent program, and setting up required profiles.
2. It provides steps to create a PL/SQL package to generate the XML code for the Excel output, including functions to print the header, data rows, and footer.
3. Running the package main procedure will execute a cursor to fetch data and write it to the XML output, which can then be viewed in Excel when selecting that option.
Stored procedures allow for grouping SQL statements and parameters to be stored and executed on a database. They provide more capabilities than scripts such as error handling and security. Parameters can pass data into and out of stored procedures. Stored procedures use structures like IF/ELSE, CASE, and cursors to implement decision-making and looping functionality similar to programming languages. Transactions allow grouping statements to commit or rollback changes and ensure data integrity.
The document provides an overview of different types of database testing including front end database testing, structural backend testing, functional backend testing, database migration testing, data warehouse testing, and batch job execution testing. It describes the key aspects to test for each type, such as verifying database schemas, stored procedures, triggers, data integrity, security, performance, and more. Screenshots are also included to exemplify some of the testing processes.
The document discusses stored procedures and functions in Oracle databases. It describes how procedures are compiled code stored in the database that can be called from client environments. Procedures allow encapsulating common operations like inserting records or updating salaries. The document provides examples of creating procedures and functions, specifying arguments, debugging errors, and managing dependencies.
The document discusses SQL SELECT statements and iSQL*Plus commands. It describes how to list data from tables, perform calculations on columns, and rename columns with aliases. It also explains how to use iSQL*Plus to write, save, execute SQL statements, and view table structures with the DESCRIBE command.
Adrian Hardy's slides from PHPNW08
Once you have your query returning the correct results, speed becomes an important factor. Speed can either be an issue from the outset, or can creep in as your dataset grows. Understanding the EXPLAIN command is essential to helping you solve and even anticipate slow queries.
Associated video: http://blip.tv/file/1791781
A stored procedure is a subroutine available to applications that access a relational database. Extensive or complex SQL processing is moved into stored procedures to improve performance. Stored procedures offer advantages like improved security, reduced network traffic, and easier maintenance compared to embedding SQL statements in an application. They allow parameters to be passed in and support flow control structures like IF/THEN clauses.
The document provides guidelines for optimizing SQL and PL/SQL code for performance. It discusses best practices for using indexes like creating them on frequently queried columns and avoiding functions on indexed columns. Other topics covered include using EXISTS instead of JOINs when possible, avoiding DISTINCT, and placing filters in the WHERE clause instead of HAVING. Modular code design, avoiding negatives and LIKE patterns, and letting the optimizer do its work are also recommended. The goal is to help programmers write efficient code by understanding query execution and tuning techniques.
1. The document describes the prerequisites for setting up output in Excel using PL/SQL with XML, including designing an Excel layout, defining a stored procedure and concurrent program, and setting up required profiles.
2. It provides steps to create a PL/SQL package to generate the XML code for the Excel output, including functions to print the header, data rows, and footer.
3. Running the package main procedure will execute a cursor to fetch data and write it to the XML output, which can then be viewed in Excel when selecting that option.
Stored procedures allow for grouping SQL statements and parameters to be stored and executed on a database. They provide more capabilities than scripts such as error handling and security. Parameters can pass data into and out of stored procedures. Stored procedures use structures like IF/ELSE, CASE, and cursors to implement decision-making and looping functionality similar to programming languages. Transactions allow grouping statements to commit or rollback changes and ensure data integrity.
The document provides an overview of different types of database testing including front end database testing, structural backend testing, functional backend testing, database migration testing, data warehouse testing, and batch job execution testing. It describes the key aspects to test for each type, such as verifying database schemas, stored procedures, triggers, data integrity, security, performance, and more. Screenshots are also included to exemplify some of the testing processes.
The document discusses stored procedures and functions in Oracle databases. It describes how procedures are compiled code stored in the database that can be called from client environments. Procedures allow encapsulating common operations like inserting records or updating salaries. The document provides examples of creating procedures and functions, specifying arguments, debugging errors, and managing dependencies.
The document discusses SQL SELECT statements and iSQL*Plus commands. It describes how to list data from tables, perform calculations on columns, and rename columns with aliases. It also explains how to use iSQL*Plus to write, save, execute SQL statements, and view table structures with the DESCRIBE command.
Adrian Hardy's slides from PHPNW08
Once you have your query returning the correct results, speed becomes an important factor. Speed can either be an issue from the outset, or can creep in as your dataset grows. Understanding the EXPLAIN command is essential to helping you solve and even anticipate slow queries.
Associated video: http://blip.tv/file/1791781
Abstract: Developers - If you are not using Bulk Binds you are not writing PL/SQL efficiently!
Bulk binding has been around for a long time, yet there are sites out there that don't utilise this feature to its full extent, if at all. Every release of Oracle improves on this functionality so obviously it's a topic worthy of consistent awareness.
In PL/SQL and SQL, there are a few nifty features related to bulk binding you may not have seen - it's not all about BULK COLLECT. Whether you're on 8i, 11g or anything in between, you'll benefit from the concepts described in this seminar and become a Bulk Binding Baron!
This document discusses procedures and functions in Oracle. Procedures are reusable blocks of SQL and PL/SQL code that perform a specific task and are stored in the database. There are two types of procedures - anonymous and stored. Stored procedures have a unique name and can accept parameters. Functions are similar to procedures but return a single value. Both procedures and functions can take input parameters of different types. The document provides examples of creating and calling a procedure and function.
The document provides steps to develop various types of procedures, reports, interfaces, and loads in Oracle Applications. It outlines the key steps as: 1) develop the code/logic; 2) move files to server; 3) create concurrent executable; 4) create concurrent program; 5) attach program to request group; and 6) submit the program. The document also summarizes how to develop inbound and outbound interfaces, and provides examples of common tables and queries.
SQL procedures and functions allow reusable groups of SQL statements to be created and executed. Procedures can contain multiple statements and take parameters, while functions return a single value. Both can be created, altered, and deleted using SQL commands like CREATE, ALTER, and DROP. Functions are preferable to procedures because they are more organized, allow return values, and avoid using temporary tables.
This document discusses various strategies for optimizing MySQL queries and indexes, including:
- Using the slow query log and EXPLAIN statement to analyze slow queries.
- Avoiding correlated subqueries and issues in older MySQL versions.
- Choosing indexes based on selectivity and covering common queries.
- Identifying and addressing full table scans and duplicate indexes.
- Understanding the different join types and selecting optimal indexes.
SQL is a standard language used to manage data in relational database systems. The SELECT statement is used to retrieve data from databases. It allows specifying columns, tables, filters and sorting. Common clauses include SELECT, FROM, WHERE, ORDER BY, and optional clauses like DISTINCT, GROUP BY and HAVING. Operators allow filtering rows by conditions, ranges, patterns and more. SQL is a non-procedural language used to perform queries, inserts, updates and deletes on a relational database.
Sql server ___________session_18(stored procedures)Ehtisham Ali
Stored procedures allow users to save and reuse SQL code. There are three types of stored procedures: user defined, extended, and system stored procedures. User defined stored procedures are custom procedures that perform repetitive tasks. Extended stored procedures allow SQL to interact with the operating system. System stored procedures are used to interact with system tables and are prefixed with "sp_". Stored procedures can take parameters, return results, and include logic like IF/ELSE statements. They improve code reuse and simplify tasks like accessing data across different queries or applications.
The document discusses how MySQL chooses query execution plans and the importance of indexing for performance. It covers the MySQL optimizer, tools for analyzing queries like EXPLAIN and TRACE, and techniques like index condition pushdown that push conditions to the storage engine. The document uses examples and a quiz to illustrate indexing concepts and how the optimizer works in MySQL.
This document discusses using SignalR and SQL dependency to create real-time updates from a database to clients. It describes how polling was used in the past versus SignalR pushing data instantly. SQL dependency allows a query to detect when results change and fire an event to SignalR. There are limitations on query types that can be monitored such as no aggregates, views, subqueries or other databases. A demo architecture is shown using SignalR to push flight info changes from a console app monitoring SQL dependency to multiple clients.
This document discusses database triggers in Oracle. It describes how to create triggers on various events like DDL statements, system events, and logon/logoff. Triggers can be used to enforce data integrity, security, auditing, and other business rules. The document outlines the benefits of triggers and how to manage, view, and troubleshoot them. Examples are provided to illustrate mutating table exceptions and how to avoid them using package state.
This document compares scripts versus stored procedures in SQL and outlines key capabilities and concepts of stored procedures. Stored procedures can contain multiple SQL statements and have more capabilities than scripts. Parameters allow sending data into and returning data from stored procedures. Stored procedures use programming constructs like variables, conditional logic, loops, and error handling to perform complex actions on the database. Transactions allow grouping statements to commit or rollback as a single unit of work.
The document discusses various techniques for optimizing database performance in Oracle, including:
- Using the cost-based optimizer (CBO) to choose the most efficient execution plan based on statistics and hints.
- Creating appropriate indexes on columns used in predicates and queries to reduce I/O and sorting.
- Applying constraints and coding practices like limiting returned rows to improve query performance.
- Tuning SQL statements through techniques like predicate selectivity, removing unnecessary objects, and leveraging indexes.
Oracle - Program with PL/SQL - Lession 16Thuan Nguyen
This document describes how to create and use database triggers in Oracle. It discusses the different types of triggers, how to create triggers for DML statements and views, and how to manage triggers. Key points include:
- Triggers can be defined to fire before or after DML statements or instead of DML on views.
- Row triggers fire once per row affected, statement triggers fire once per statement.
- Triggers use OLD and NEW qualifiers to access old and new row values.
- INSTEAD OF triggers on views perform DML instead of the triggering statement.
- Triggers must be carefully tested to avoid unintended consequences.
This document discusses techniques for improving SQL query performance by avoiding function calls in SQL queries and leveraging caching mechanisms. It covers scalar subquery caching, which caches the results of functions used in scalar subqueries to avoid repeated execution. Deterministic functions are also discussed, which Oracle can optimize by caching results. The document then introduces the cross-session PL/SQL function result cache and SQL result cache available in Oracle 11g, which cache and reuse function results and full query results across sessions to improve response times for repetitive queries and functions.
Query processing in forms involves firing pre-query and post-query triggers. A pre-query trigger fires before a query executes and can be used to check or modify query conditions. A post-query trigger fires for each fetched record and can be used to populate additional items and perform calculations. Where clauses from multiple sources are combined with AND and order by clauses are prioritized.
This document discusses stored procedures in SQL Server. It begins by explaining that stored procedures allow encapsulation of repetitive tasks and are stored in the database data dictionary. It then shows how stored procedures reduce network traffic and client-server communication compared to individual SQL statements. The document provides examples of how to create a stored procedure using CREATE PROCEDURE and how to call it using EXEC. It notes advantages like precompiled execution, reduced traffic, code reuse, and security control. It also demonstrates using parameters, loops, conditions and variables inside stored procedures.
A trigger is a special type of database object that automatically executes in response to certain events like data insertion, deletion or modification on a table. The main difference between a trigger and a stored procedure is that a trigger is attached to a table and fires automatically in response to data changes, while a stored procedure must be explicitly called. There are two main types of triggers - AFTER triggers which run after the triggering event, and INSTEAD OF triggers which run instead of the triggering event and can intercept and modify the triggering action. Triggers are useful for performing actions in response to data changes, like sending emails or updating additional tables.
This document discusses the importance of public speaking and effective communication techniques. It notes that public speaking is the number one fear for many people. It then provides tips for preparing and delivering an effective speech, including doing research on the topic, practicing your speech, and maintaining a confident presence through good eye contact, gestures, and body language. Sample speech outlines are also included. The document emphasizes that preparation and practice are key to overcoming fears of public speaking and delivering an impactful presentation.
This document provides an overview of Java Database Connectivity (JDBC) and how to use it. It discusses how JDBC works by registering drivers, connecting to databases, and executing SQL statements. It also provides steps for configuring JDBC with Eclipse and Microsoft SQL Server, including downloading drivers and copying files. Examples are given for creating tables, executing queries with the Statement interface, and fetching data from the ResultSet. The document concludes by demonstrating how to properly close resources.
This document presents a case study on the One Laptop Per Child (OLPC) project from a class at Kobe Institute of Computing in Fall 2014. It provides an overview of e-learning and the OLPC project, discusses the impacts and challenges of OLPC, and offers recommendations to overcome challenges. A group of 5 students - Nasratullah, Said Zia, Hilla, Akaliza Keza, and Raymond - presented on the topic, outlining the contents of their presentation.
This document provides an overview of how to create forms in HTML. It discusses the main components of forms, including common form controls like text fields, checkboxes, radio buttons, selection menus, file uploads, and buttons. It explains how to set attributes like name, value, size for each form control. The document also covers how form data is passed via the GET and POST methods, and how hidden fields can be used to pass additional data without the user seeing it. The overall purpose is to teach the fundamentals of creating HTML forms for collecting user input.
Abstract: Developers - If you are not using Bulk Binds you are not writing PL/SQL efficiently!
Bulk binding has been around for a long time, yet there are sites out there that don't utilise this feature to its full extent, if at all. Every release of Oracle improves on this functionality so obviously it's a topic worthy of consistent awareness.
In PL/SQL and SQL, there are a few nifty features related to bulk binding you may not have seen - it's not all about BULK COLLECT. Whether you're on 8i, 11g or anything in between, you'll benefit from the concepts described in this seminar and become a Bulk Binding Baron!
This document discusses procedures and functions in Oracle. Procedures are reusable blocks of SQL and PL/SQL code that perform a specific task and are stored in the database. There are two types of procedures - anonymous and stored. Stored procedures have a unique name and can accept parameters. Functions are similar to procedures but return a single value. Both procedures and functions can take input parameters of different types. The document provides examples of creating and calling a procedure and function.
The document provides steps to develop various types of procedures, reports, interfaces, and loads in Oracle Applications. It outlines the key steps as: 1) develop the code/logic; 2) move files to server; 3) create concurrent executable; 4) create concurrent program; 5) attach program to request group; and 6) submit the program. The document also summarizes how to develop inbound and outbound interfaces, and provides examples of common tables and queries.
SQL procedures and functions allow reusable groups of SQL statements to be created and executed. Procedures can contain multiple statements and take parameters, while functions return a single value. Both can be created, altered, and deleted using SQL commands like CREATE, ALTER, and DROP. Functions are preferable to procedures because they are more organized, allow return values, and avoid using temporary tables.
This document discusses various strategies for optimizing MySQL queries and indexes, including:
- Using the slow query log and EXPLAIN statement to analyze slow queries.
- Avoiding correlated subqueries and issues in older MySQL versions.
- Choosing indexes based on selectivity and covering common queries.
- Identifying and addressing full table scans and duplicate indexes.
- Understanding the different join types and selecting optimal indexes.
SQL is a standard language used to manage data in relational database systems. The SELECT statement is used to retrieve data from databases. It allows specifying columns, tables, filters and sorting. Common clauses include SELECT, FROM, WHERE, ORDER BY, and optional clauses like DISTINCT, GROUP BY and HAVING. Operators allow filtering rows by conditions, ranges, patterns and more. SQL is a non-procedural language used to perform queries, inserts, updates and deletes on a relational database.
Sql server ___________session_18(stored procedures)Ehtisham Ali
Stored procedures allow users to save and reuse SQL code. There are three types of stored procedures: user defined, extended, and system stored procedures. User defined stored procedures are custom procedures that perform repetitive tasks. Extended stored procedures allow SQL to interact with the operating system. System stored procedures are used to interact with system tables and are prefixed with "sp_". Stored procedures can take parameters, return results, and include logic like IF/ELSE statements. They improve code reuse and simplify tasks like accessing data across different queries or applications.
The document discusses how MySQL chooses query execution plans and the importance of indexing for performance. It covers the MySQL optimizer, tools for analyzing queries like EXPLAIN and TRACE, and techniques like index condition pushdown that push conditions to the storage engine. The document uses examples and a quiz to illustrate indexing concepts and how the optimizer works in MySQL.
This document discusses using SignalR and SQL dependency to create real-time updates from a database to clients. It describes how polling was used in the past versus SignalR pushing data instantly. SQL dependency allows a query to detect when results change and fire an event to SignalR. There are limitations on query types that can be monitored such as no aggregates, views, subqueries or other databases. A demo architecture is shown using SignalR to push flight info changes from a console app monitoring SQL dependency to multiple clients.
This document discusses database triggers in Oracle. It describes how to create triggers on various events like DDL statements, system events, and logon/logoff. Triggers can be used to enforce data integrity, security, auditing, and other business rules. The document outlines the benefits of triggers and how to manage, view, and troubleshoot them. Examples are provided to illustrate mutating table exceptions and how to avoid them using package state.
This document compares scripts versus stored procedures in SQL and outlines key capabilities and concepts of stored procedures. Stored procedures can contain multiple SQL statements and have more capabilities than scripts. Parameters allow sending data into and returning data from stored procedures. Stored procedures use programming constructs like variables, conditional logic, loops, and error handling to perform complex actions on the database. Transactions allow grouping statements to commit or rollback as a single unit of work.
The document discusses various techniques for optimizing database performance in Oracle, including:
- Using the cost-based optimizer (CBO) to choose the most efficient execution plan based on statistics and hints.
- Creating appropriate indexes on columns used in predicates and queries to reduce I/O and sorting.
- Applying constraints and coding practices like limiting returned rows to improve query performance.
- Tuning SQL statements through techniques like predicate selectivity, removing unnecessary objects, and leveraging indexes.
Oracle - Program with PL/SQL - Lession 16Thuan Nguyen
This document describes how to create and use database triggers in Oracle. It discusses the different types of triggers, how to create triggers for DML statements and views, and how to manage triggers. Key points include:
- Triggers can be defined to fire before or after DML statements or instead of DML on views.
- Row triggers fire once per row affected, statement triggers fire once per statement.
- Triggers use OLD and NEW qualifiers to access old and new row values.
- INSTEAD OF triggers on views perform DML instead of the triggering statement.
- Triggers must be carefully tested to avoid unintended consequences.
This document discusses techniques for improving SQL query performance by avoiding function calls in SQL queries and leveraging caching mechanisms. It covers scalar subquery caching, which caches the results of functions used in scalar subqueries to avoid repeated execution. Deterministic functions are also discussed, which Oracle can optimize by caching results. The document then introduces the cross-session PL/SQL function result cache and SQL result cache available in Oracle 11g, which cache and reuse function results and full query results across sessions to improve response times for repetitive queries and functions.
Query processing in forms involves firing pre-query and post-query triggers. A pre-query trigger fires before a query executes and can be used to check or modify query conditions. A post-query trigger fires for each fetched record and can be used to populate additional items and perform calculations. Where clauses from multiple sources are combined with AND and order by clauses are prioritized.
This document discusses stored procedures in SQL Server. It begins by explaining that stored procedures allow encapsulation of repetitive tasks and are stored in the database data dictionary. It then shows how stored procedures reduce network traffic and client-server communication compared to individual SQL statements. The document provides examples of how to create a stored procedure using CREATE PROCEDURE and how to call it using EXEC. It notes advantages like precompiled execution, reduced traffic, code reuse, and security control. It also demonstrates using parameters, loops, conditions and variables inside stored procedures.
A trigger is a special type of database object that automatically executes in response to certain events like data insertion, deletion or modification on a table. The main difference between a trigger and a stored procedure is that a trigger is attached to a table and fires automatically in response to data changes, while a stored procedure must be explicitly called. There are two main types of triggers - AFTER triggers which run after the triggering event, and INSTEAD OF triggers which run instead of the triggering event and can intercept and modify the triggering action. Triggers are useful for performing actions in response to data changes, like sending emails or updating additional tables.
This document discusses the importance of public speaking and effective communication techniques. It notes that public speaking is the number one fear for many people. It then provides tips for preparing and delivering an effective speech, including doing research on the topic, practicing your speech, and maintaining a confident presence through good eye contact, gestures, and body language. Sample speech outlines are also included. The document emphasizes that preparation and practice are key to overcoming fears of public speaking and delivering an impactful presentation.
This document provides an overview of Java Database Connectivity (JDBC) and how to use it. It discusses how JDBC works by registering drivers, connecting to databases, and executing SQL statements. It also provides steps for configuring JDBC with Eclipse and Microsoft SQL Server, including downloading drivers and copying files. Examples are given for creating tables, executing queries with the Statement interface, and fetching data from the ResultSet. The document concludes by demonstrating how to properly close resources.
This document presents a case study on the One Laptop Per Child (OLPC) project from a class at Kobe Institute of Computing in Fall 2014. It provides an overview of e-learning and the OLPC project, discusses the impacts and challenges of OLPC, and offers recommendations to overcome challenges. A group of 5 students - Nasratullah, Said Zia, Hilla, Akaliza Keza, and Raymond - presented on the topic, outlining the contents of their presentation.
This document provides an overview of how to create forms in HTML. It discusses the main components of forms, including common form controls like text fields, checkboxes, radio buttons, selection menus, file uploads, and buttons. It explains how to set attributes like name, value, size for each form control. The document also covers how form data is passed via the GET and POST methods, and how hidden fields can be used to pass additional data without the user seeing it. The overall purpose is to teach the fundamentals of creating HTML forms for collecting user input.
This document outlines the steps to build a simple website with HTML. It introduces HTML tags for headings, paragraphs, links and images. It explains how to add text and media content to the page and provides a basic template for the website framework.
This document outlines 10 steps to take control of your life:
1. Be clean and organized. Clean your room and don't just shove things under the bed.
2. Look good by styling your hair and wearing nice clothes and a smile.
3. Accept yourself by thinking of your positive qualities instead of focusing on what you don't like.
4. Become more independent but don't do everything alone.
5. Set goals and make plans to achieve them, like saving money for something you want.
6. Be healthy through exercise and having a positive attitude.
7. Choose good friends who do well in school instead of bullies or failing students.
8. Get good
Introduction to graph databases in term of neo4jAbdullah Hamidi
The records in a graph database are called Nodes .
Nodes are connected through typed, directed Relationships.
Each single Node and Relationship can have named attributes referred to as Properties.
A Label is a name that organizes nodes into groups.
The flexibility of the graph model has allowed us to add new nodes and new relationships.
Relationships in a graph naturally form paths. Querying—or traversing—the graph involves following paths.
bitCharities democratizes charitable giving by connecting brands, non-profits and donors.
bitCharities.com gathers large scale data on its entire user and donor base and shares it at no cost with the participating charities so that they can scale their fundraising efforts with larger corporate sponsors. bitCharities gives back 100% of the donations gathered on its platform to the charities.
While donors can easily, simply, and publicly support a wide range of charitable organizations, brands can align their philanthropic efforts with their customers. bitCharities can engage the first party brand's database and activate them to participate in charitable donations, creating global awareness and a call for action even before any money is spent.
Currently bitCharities gathers an average of 8,000 daily donations:
http://www.bitlanders.com/pages/top_charities
bitCharities is an organization who uses Bitcoin and other crypto-assets to empower digital citizens of any income level with a user-friendly platform to support charities of their choice through micro donations starting at 1 Satoshi (about 1/5000th of a US cent).
This document discusses the simple past tense in English. It describes five uses of the simple past: 1) to express a completed action at a specific time in the past, 2) to list a series of completed actions, 3) to describe an action that occurred for a duration of time in the past, 4) to describe past habits, and 5) to describe past facts or generalizations. Examples are provided to illustrate each use of the simple past tense. The simple past is formed using regular verbs with "-ed" and irregular verb forms.
Web app development_cookies_sessions_14Hassen Poreya
This document discusses maintaining state in PHP using cookies and sessions. It explains that HTTP is stateless, meaning it does not remember information from previous requests. Cookies and sessions allow state to be maintained across multiple pages. Cookies are small text files stored on the user's computer that associate data with a domain. Sessions use server-side storage and are more secure than cookies. The document provides examples of how to set, read, and delete both cookies and sessions in PHP to maintain state across web pages.
Secure web programming plus end users' awareness are the last line of defense against attacks targeted at the corporate systems, particularly web applications, in the era of world-wide web.
Most web application attacks occur through Cross Site Scripting (XSS), and SQL Injection. On the other hand, most web application vulnerabilities arise from weak coding with failure to properly validate users' input, and failure to properly sanitize output while displaying the data to the visitors.
The literature also confirms the following web application weaknesses in 2010: 26% improper output handling, 22% improper input handling, and 15% insufficient authentication, and others.
Abdul Rahman Sherzad, lecturer at Computer Science Faculty of Herat University, and Ph.D. student at Technical University of Berlin gave a presentation at 12th IT conference on Higher Education for Afghanistan in MoHE, and then conducted a seminar at Hariwa Institute of Higher Education in Herat, Afghanistan introducing web application security threats by demonstrating the security problems that exist in corporate systems with a strong emphasis on secure development. Major security vulnerabilities, secure design and coding best practices when designing and developing web-based applications were covered.
The main objective of the presentation was raising awareness about the problems that might occur in web-application systems, as well as secure coding practices and principles. The presentation's aims were to build security awareness for web applications, to discuss the threat landscape and the controls users should use during the software development lifecycle, to introduce attack methods, to discuss approaches for discovering security vulnerabilities, and finally to discuss the basics of secure web development techniques and principles.
Fondo gallerie storiche romane - Destinazione Donna - catalogo della mostraAlessandro Califano, PhD
The exhibition "Fondo gallerie storiche romane - Destinazione Donna" - about women-led art galleries in the Sixties and Seventies in Rome - ran at the Library of MACRO Contemporary Art Museum in Rome between 5 March and 15 August 2015.
This e-book, edited by Alessandro Califano and Elisabetta Bianchi, is the catalogue of the exhibition, published two years later. (Language: Italian)
A due anni dall'inaugurazione della mostra "Fondo gallerie storiche romane - Destinazione Donna" - tenutasi dal 5 marzo al 15 agosto 2015 presso la biblioteca del MACRO, Museo d'Arte Contemporanea di Roma, e dedicata alle gallerie d'arte romane dirette o fondate da donne negli anni Sessanta e Settanta - vede finalmente la luce, a cura di Alessandro Califano ed Elisabetta Bianchi, il catalogo digitale ad essa dedicato.
The document provides an overview of Google Search Console, which allows website owners to monitor how their site appears in Google search results and identify potential issues. It discusses how to register a site with Search Console and describes several tools available in Search Console, including tools for structured data, data highlighting, sitelinks, traffic analysis, the site index, crawling, and bounce rates. Reducing bounce rates is important as a high rate can indicate users are not engaged by the content or navigation.
Enterprise Resource Planning using Odoo/OpenERP in AfghanistanFarshid Ghyasi
Odoo is an open source comprehensive suite of business applications including Sales, CRM, Project management, Warehouse management, Accounting.
This presentation is about Odoo implementation in Afghanistan
Like us at: http://www.facebook.com/odoo.af
Website: http://www.netlinks.af
Architecting for failure - Why are distributed systems hard?Markus Eisele
Devnexus 2017
As we architect our systems for greater demands, scale, uptime, and performance, the hardest thing to control becomes the environment in which we deploy and the subtle but crucial interactions between complicated systems. And microservices obviously are the way to go forward with those complicated systems. But what makes it so hard to build them? And why should you embrace failure instead of doing what we can do best: Preventing failure. This talk introduces you to the problem domain of a distributed system which consists of a couple of microservices. It shows how to build, deploy and orchestrate the chaos and introduces you to a couple of patterns to prevent and compensate failure.
The document discusses global development alliances in higher education in Afghanistan. It describes several key strategies used, including the development of an integrated digital library platform, a course management system, and partnerships between Afghan and international universities to build capacity in areas like computer science, engineering, and public policy. The outcomes of these alliances included increased student and lecturer use of information technology, opportunities for further education abroad, and challenges in sustaining reforms over multiple years given ongoing changes in Afghanistan.
The document discusses pagination in Bootstrap and provides an example of basic pagination. It shows how to create pagination by adding the .pagination class to an unordered list element. The document also briefly mentions other Bootstrap components like breadcrumbs, panels, dropdowns and lists before concluding.
This document discusses monitoring virtualized environments. It begins by explaining virtualization and its benefits, then discusses metrics that should be monitored, including performance, capacity, security, and billing. It presents a monitoring framework architecture and examines tools like eG VM Monitor that can provide comprehensive visibility. While eG VM Monitor effectively monitors all aspects of the virtual infrastructure, it has drawbacks of complexity and cost. Overall, the document emphasizes the importance of monitoring virtualized environments and provides guidance on selecting tools and approaches.
SQL is a standard language for creating and manipulating databases. It allows users to define, manipulate, and control access to data in a database. Some key capabilities of SQL include creating and deleting tables, inserting, updating, and deleting rows of data, retrieving data with queries, and setting access privileges for database users and applications. SQL is supported by many popular database systems like Oracle, MySQL, SQL Server, and PostgreSQL.
This document provides an overview of an introductory training session on SQLite, a popular database for Internet of Things (IoT) applications. The agenda covers installing and configuring SQLite, basic commands like .tables and .schema, accessing databases using ATTACH and DETACH, data types, operators, and SQL statements like SELECT, INSERT, UPDATE, and DELETE. The session teaches the basics of using SQLite through examples of commands, queries, and making changes to databases.
The document provides examples and explanations of common SQL commands used to query, manipulate, and manage data in a relational database. Key points include:
- The SELECT statement is used to query data from database tables. The WHERE clause filters results.
- INSERT, UPDATE and DELETE statements are used to add, modify and remove rows in database tables.
- CREATE, ALTER, DROP statements manage the database schema by creating, modifying and deleting tables, columns, keys and constraints.
- PRIMARY KEY and FOREIGN KEY constraints enforce data integrity and relationships between tables.
This document provides an overview of SQL, DBMS, and databases. It discusses what SQL is and its uses. The core SQL commands like SELECT, INSERT, UPDATE, and DELETE are explained along with syntax examples. Key concepts like database, DBMS, different data models (hierarchical, network, relational), and database objectives are defined. The document is written by a group of five students and covers the essential topics at a high level for understanding SQL and relational databases.
Performance tuning involves improving the performance of computer systems, typically databases. It involves identifying high load or inefficient SQL statements, verifying execution plans, and implementing corrective actions. Tuning goals include reducing workload through better queries and plans, balancing workload between peak and off-peak times, and parallelizing workload. High load statements can be identified through SQL tracing tools, and TKProf can analyze trace files to identify top SQL and plans.
Public Training SQL Implementation & Embedded Programming in IBM iHany Paulina
Dibuka pendaftaran Public Training SQL Implementation & Embedded Programming- in IBM i ( 23-27 Mei 2016 ). INFO TRAINING : +6281381088767/hanypaulina7@gmail.com
This document discusses stored procedures in databases. It provides an overview of stored procedures, their advantages like reduced network traffic, and how they allow local variables, loops, and examination of data tuples. It describes how to write stored procedures using languages like SQL, including declaring parameters, and provides examples of stored procedures using conditional statements, loops, and cursors to process data.
This document is a training guide that introduces SQL and SQL*Plus for beginners. It covers:
- An overview of relational database concepts like tables, rows, columns and keys
- What SQL and SQL*Plus are and their basic functions
- How to start SQL*Plus and log into an Oracle database
- An introduction to the different types of SQL commands for querying, modifying data, and modifying database structure
- A course outline that will provide further instruction on SQL and SQL*Plus topics like queries, functions, joins, modifying data and databases, and SQL*Plus reporting.
The document provides information about stored procedures in databases:
- A stored procedure is a way to encapsulate repetitive tasks like queries into reusable code blocks stored in the database.
- Stored procedures offer advantages like precompiled execution for improved performance, reduced network traffic, code reuse, and enhanced security.
- The example shows how to create a stored procedure using delimiters to change parsing behavior and pass parameters to a procedure. Cursors allow fetching multiple rows from a result set into variables.
This book can teach you a variety of topics, depending on your level of experience with SQL Server and what you want to learn. Here are some of the topics that a typical MS SQL Server tutorial may cover:
Introduction to relational databases - A tutorial on MS SQL Server usually starts with an overview of the concepts and principles of relational databases, including tables, columns, rows, primary keys, and foreign keys.
Basic SQL queries - The tutorial may cover the basics of SQL syntax and teach you how to write simple SELECT, INSERT, UPDATE, and DELETE statements.
Advanced SQL queries - The tutorial may cover more complex SQL queries, including JOINs, subqueries, and aggregation functions.
Database design and normalization - The tutorial may cover the principles of database design and normalization, and teach you how to create and modify database schemas.
Stored procedures and functions - The tutorial may cover how to create and use stored procedures and functions to encapsulate SQL code and improve performance.
Database administration and security - The tutorial may cover topics related to database administration and security, including backups and restores, user permissions, and authentication modes.
These are just some of the topics that a MS SQL Server tutorial may cover. The specific content and level of detail will depend on the tutorial and the intended audience.
The document provides guidelines for naming conventions, structure, formatting, and coding of SQL Server databases. It recommends:
1) Using Pascal casing and suffixes like "s" for table names and prefixes for other objects.
2) Normalizing data to third normal form and avoiding TEXT data types when possible.
3) Formatting code for readability using styles like uppercase SQL keywords and indentation.
4) Coding best practices like optimizing queries, avoiding cursors, and checking for errors.
PL/SQL provides two types of composite datatypes - records and collections. Records allow grouping of related data elements, while collections allow storing multiple values in a single variable. Collections include index-by tables, nested tables, and varrays. Cursors allow processing rows from a SQL query one by one. Explicit cursors must be declared, opened, fetched from, and closed. Implicit cursors are used for DML statements. Functions return a value and can be used in SQL expressions, while procedures perform actions without returning a value. Both can accept parameters.
The document provides an overview of advanced PL/SQL programming concepts including:
- Decision control structures like IF/THEN, IF/THEN/ELSE, and nested IF statements.
- Using SQL queries within PL/SQL programs.
- Implementing loops using LOOP/EXIT, WHILE, FOR, and cursor FOR loops.
- Retrieving and manipulating database data using implicit and explicit cursors.
- Handling runtime errors through the use of predefined, undefined, and user-defined exceptions.
Lecture 2.3.26_Conditional Control Structure.pptxShivam481778
This document provides an overview of a Database Management Systems course. It outlines the course objectives which are to understand database concepts, implement SQL statements, and understand transaction processing and recovery techniques. It also lists an expected course outcome of being able to apply relational algebra and calculus to query databases. The document then discusses control structures in PL/SQL including conditional controls like IF-THEN-ELSE statements and iterative controls like loops. It provides examples of PL/SQL code using these structures to find even numbers and determine the largest of three numbers.
The document discusses cursors in PL/SQL. It defines a cursor as a temporary work area that stores rows of data retrieved from a database. Cursors allow processing of result sets row by row. The document covers implicit and explicit cursors, with explicit cursors requiring declaration, opening, fetching, and closing steps. An example demonstrates these steps to retrieve rows from a customers table and print their values. The document also briefly introduces topics on big data, data warehousing and data mining.
This document provides an overview of SQL and PL/SQL concepts including data definition language (DDL), data manipulation language (DML), data control language (DCL), and transaction control language (TCL). It discusses SQL commands to create, modify and delete database objects as well as manipulate data. It also covers PL/SQL concepts such as stored procedures, functions, cursors and triggers. Indexes and their use in improving query performance are also summarized.
This document provides an overview of SQL concepts including:
- Data types like char, varchar, and null
- Core SQL commands like select, update, delete, truncate, and alter
- Joins like inner, left, and cross joins
- Transaction control with commit, rollback, and savepoints
- Exception handling and the ACID properties of transactions
- Other objects like views, sequences, indexes, and stored procedures
Oracle Database 12c New Features for Developers and DBAs - OTN TOUR LA 2015Alex Zaballa
Oracle Database 12c includes over 500 new features designed for cloud computing, big data, security, and availability. Key features include Multitenant architecture which allows multiple databases to share a single database instance, In-Memory which stores frequently accessed data in memory for faster queries, and new security features like data redaction and encryption. Additional features improve performance, manageability, and flexibility of the database like JSON support, heat map statistics, and identity columns.
SQL is a standard language for accessing and manipulating databases. It allows users to retrieve, insert, update, and delete data as well as create databases and tables. Common SQL queries include SELECT, UPDATE, DELETE, INSERT, CREATE DATABASE, ALTER DATABASE, CREATE TABLE, and ALTER TABLE.
SQL is a standard language used to communicate with databases to perform tasks like storing, manipulating, and retrieving data. It includes commands like SELECT, INSERT, UPDATE, and DELETE. The SELECT statement is used to retrieve data from database tables. It can select all columns using "*" or specific columns by name. The WHERE clause filters records by specifying conditions that must be true. Operators like AND and OR can be used to filter records based on multiple conditions.
Enhanced entity relationship model lecture with English language and Persian Translation. This lecture is for absolutely beginners. This is the sixth lecture in database one.
Relationship in database lecture with English language and Persian Translation. This lecture is for absolutely beginners. This is the fifth lecture in database one.
Identifiers lecture with English language and Persian Translation. This lecture is for absolutely beginners. This is the fourth lecture in database one.
Requirements analysis lecture with English language and Persian Translation. This lecture is for absolutely beginners. This is the third lecture in database one, the first lecture is about introduction to database and the second lecture is about SDLC. You can also find the above mentioned lectures in slideshare.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
2. Topics:
• SQL SELECT TOP Clause
• SQL LIKE Operator
• SQL IN Operator
• SQL INSERT INTO Statement
• SQL UPDATE Statement
• SQL DELETE Statement
•واره جملهSelect top،SQL
•عملیهlike،SQL
•عملیهIn،SQL
•دستورInsert into،SQL
•دستورupdate،SQL
•دستورdelete،SQL
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
2
3. SQL SELECT TOP Clause:
• The SELECT TOP clause is
used to specify the number
of records to return.
• The SELECT TOP clause can
be very useful on large
tables with thousands of
records. Returning a large
number of records can
impact on performance.
• Note: Not all database
systems support the SELECT
TOP clause.
•واره جملهselect topبرای
ریکاردهایکه تعداد کردن مشخص
میرود بکار میشود داده برگشت.
•واره جملهselect topجدول در
هزاران تعداد به که بزرگ های
واقع مفید بسیار داشته ریکاردشده
میتواند.ب ریکاردها دادن برگشته
اجراعات کیفیت روی زیاد تعداد
میتواند مانده تأثیر.
•یادداشت:دیتاب های سیستم تمامیس
واره جملهselect topپشتیبانی را
نمیکند.
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
3
4. Continue…
• SQL Server / MS Access Syntax:
• SELECT TOP number|percent column_name(s) FROM
table_name;
• MySQL Syntax:
• SELECT column_name(s) FROM table_name LIMIT number;
• Examples:
1. SELECT TOP 2 * FROM Customers;
2. SELECT TOP 50 PERCENT * FROM Customers;
3. SELECT * FROM Persons LIMIT 5;
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
4
5. SQL LIKE Operator:
• The LIKE operator is used in
a WHERE clause to search
for a specified pattern in a
column.
• Syntax:
• SELECT column_name(s)
FROM table_name
WHERE column_name LIKE
pattern;
•عملیهlikeواره جمله درwhere
در خاص شیوه یک دریافتن برای
میرود بکار ستون یک.
•ساختار:
• SELECT column_name(s)
FROM table_name
WHERE column_name LIKE
pattern;
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
5
6. Continue…
• Examples:
• SELECT * FROM Customers WHERE City LIKE 's%';
• SELECT * FROM Customers WHERE City LIKE '%s';
• SELECT * FROM Customers WHERE Country LIKE '%land%';
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
6
7. SQL IN Operator:
• The IN operator allows you
to specify multiple values in
a WHERE clause.
• Syntax:
• SELECT column_name(s)
FROM table_name
WHERE column_name IN
(value1,value2,...);
•عملیهINکردن مشخص بخاطر
واره جمله در قیمت چندینwhere
میرود بکار.
•ساختار:
• SELECT column_name(s)
FROM table_name
WHERE column_name IN
(value1,value2,...);
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
7
8. Continue…
• Example:
• SELECT * FROM Customers WHERE City IN ('Paris','London');
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
8
9. SQL INSERT INTO Statement:
• The INSERT INTO statement
is used to insert new
records in a table.
• Syntax:
• It is possible to write the
INSERT INTO statement in
two forms.
• The first form does not
specify the column names
where the data will be
inserted, only their values
as follow:
•دستورinsert intoدرج برای
دیتابیس به جدید ریکارد کردنبکار
میرود.
•ساختار:
•دستورinsert intoشکل بدو
شود نوشته ممکن.
•نمی مشخص ها ستون که اول روش
جدول یک درج ها قیمت فقط و شود
ذیل قرار میگردد:
Nangarhar University Database1 9
10. Continue…
• INSERT INTO table_name
VALUES
(value1,value2,value3,...);
• The second form specifies
both the column names and
the values to be inserted:
• INSERT INTO table_name
(column1,column2,column3,
...)
VALUES
(value1,value2,value3,...);
• INSERT INTO table_name
VALUES
(value1,value2,value3,...);
•هم و ها ستون هم دوم روش در
مشخص میگردد درج که های قیمت
ذیل قرار میشود:
• INSERT INTO table_name
(column1,column2,column3,
...)
VALUES
(value1,value2,value3,...);
Nangarhar University Database1 10
11. Continue…
• Examples:
1. INSERT INTO Customers (CustomerName, City, Country)
VALUES ('Cardinal', 'Stavanger', 'Norway');
2. INSERT INTO Customers
VALUES ('Cardinal', 'Stavanger', 'Norway');
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
11
12. SQL UPDATE Statement:
• The UPDATE statement is
used to update existing
records in a table.
• Syntax:
UPDATE table_name
SET column1=value1,
column2=value2,...
WHERE
some_column=some_value;
•دستورUpdateروز به برای
یک در موجود ریکاردهای کردن
میرود بکار جدول.
•ساختار:
• UPDATE table_name
SET column1=value1,
column2=value2,...
WHERE
some_column=some_value;
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
12
13. Continue…
• Examples:
• UPDATE Customers SET ContactName='Alfred Schmidt',
City='Hamburg‘ WHERE CustomerName='Alfreds Futterkiste';
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
13
14. Continue…
• Update Warning!
• Be careful when updating
records. If we had omitted
the WHERE clause, in the
example above, like this:
• UPDATE Customers
SET ContactName='Alfred
Schmidt', City='Hamburg';
• All the records in the
customer table will be
updated.
•درآوردن روز به هشدار:
•آوردن روز به در که باشید متوجه
واره جمله هرگاه ریکاردهاwhere
رو به ها ریکارد تمام ننویسیم راز
ذیل قرار شد خواهد درآورده:
• UPDATE Customers
SET ContactName='Alfred
Schmidt', City='Hamburg';
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
14
15. SQL DELETE Statement:
• The DELETE statement is
used to delete records in a
table.
• Syntax:
• DELETE FROM table_name
WHERE
some_column=some_value;
•دستورdeleteکردن حذف برای
بکار جدول یک در ریکاردها
میرود.
•ساختار:
• DELETE FROM table_name
WHERE
some_column=some_value;
2:04 AM
Gharjistan University Computer Science
Faculty Farah Branch
15
16. Continue…
• Examples:
• DELETE FROM Customers WHERE CustomerName='Alfreds
Futterkiste' AND ContactName='Maria Anders';
Nangarhar University Database1 16
17. Delete All Data:
• It is possible to delete all
rows in a table without
deleting the table. This
means that the table
structure, attributes, and
indexes will be intact:
• Syntax:
• DELETE FROM table_name;
or
DELETE * FROM
table_name;
•یک در سطرها تمام که است ممکن
حذف جدول خود اینکه بدون جدول
کرد حذف شود.که معنا این به
و خاصه صفات ،جدول ساختار
indexباقی درست و ثابت آن های
ماند خواهد.
•ساختار:
• DELETE FROM table_name;
or
DELETE * FROM
table_name;
Nangarhar University Database1 17
18. Continue…
• Note: Be very careful when
deleting records. You
cannot undo this
statement!
•نوت:
•هاه ریکارد کردن حذف وقت در
دوبا چونکه باشید مواظب بسیارره
را دستور این که نمیتوانیدundo
کنید.
Nangarhar University Database1 18