The document provides information about connecting to and interacting with a MySQL database using SQL commands in the MySQL shell. It covers basic queries, creating and selecting databases, creating and manipulating tables, inserting and selecting data, and other common SQL queries like sorting, filtering, grouping and counting rows. The document uses examples to demonstrate how to execute various SQL statements and view or modify data in a sample pets database with tables.
Data Exploration with Apache Drill: Day 1Charles Givre
Study after study shows that data scientists and analysts spend between 50% and 90% of their time preparing their data for analysis. Using Drill, you can dramatically reduce the time it takes to go from raw data to insight. This course will show you how.
The course material for this presentation are available at https://github.com/cgivre/data-exploration-with-apache-drill
What is the best full text search engine for Python?Andrii Soldatenko
Nowadays we can see lot’s of benchmarks and performance tests of different web frameworks and Python tools. Regarding to search engines, it’s difficult to find useful information especially benchmarks or comparing between different search engines. It’s difficult to manage what search engine you should select for instance, ElasticSearch, Postgres Full Text Search or may be Sphinx or Whoosh. You face a difficult choice, that’s why I am pleased to share with you my acquired experience and benchmarks and focus on how to compare full text search engines for Python.
Data Exploration with Apache Drill: Day 1Charles Givre
Study after study shows that data scientists and analysts spend between 50% and 90% of their time preparing their data for analysis. Using Drill, you can dramatically reduce the time it takes to go from raw data to insight. This course will show you how.
The course material for this presentation are available at https://github.com/cgivre/data-exploration-with-apache-drill
What is the best full text search engine for Python?Andrii Soldatenko
Nowadays we can see lot’s of benchmarks and performance tests of different web frameworks and Python tools. Regarding to search engines, it’s difficult to find useful information especially benchmarks or comparing between different search engines. It’s difficult to manage what search engine you should select for instance, ElasticSearch, Postgres Full Text Search or may be Sphinx or Whoosh. You face a difficult choice, that’s why I am pleased to share with you my acquired experience and benchmarks and focus on how to compare full text search engines for Python.
Day 1 : Slides for my training course, Well Grounded Python Coding. I'm using PyCharm Pro and Anaconda along the course. Not much to read but it's the main material for my teaching.
Day 1 Slide Handout for my training course, Well Grounded Python Coding. I'm using PyCharm Pro and Anaconda along the course. Not much to read but it's the main material for my teaching.
Covered:
1. Databases and Schemas
2. Tablespaces
3. Data Type
4. Exploring Databases
5. Locating the database server's message log
6. Locating the database's system identifier
7. Listing databases on this database server
8. How much disk space does a table use?
9. Which are my biggest tables?
10. How many rows are there in a table?
11. Quickly estimating the number of rows in a table
12. Understanding object dependencies
Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Inf...Priyanka Aash
The Namecoin and Emercoin blockchains were designed to provide decentralized and takedown-resistant domain names to users with the reported goal of promoting free speech. By leveraging unofficial Top-Level Domains (TLDs) such as .bit and alternate DNS resolution methods such as the OpenNIC project, users can register and configure their own domains on these blockchains at a relatively cheap price.
In recent years, cybercriminals have adopted and abused this infrastructure and implemented it into well-known malware such as Dimnie, Smoke Loader, and Necurs as well as larger, more targeted workflows. The resiliency of blockchain techology prevents researchers and ISPs from taking down or sinkholing these domains. In addition, limited public knowledge of this threat in a larger context and the constraint of alternative DNS resolution mitigates an analyst's ability to map out related domains and IP addresses when malicious activity is identified.
On the other hand, blockchain-based infrastructure comes with a serious drawback: data added to or removed from these blockchains becomes a permanent record of a threat actor's activity. This talk is intended to leverage this attribute to tackle these issues, providing high and medium-confidence methodologies for mapping out these blockchains through TTP analysis, script-based transaction mapping, and index-based infrastructure correlation. In doing so, analysts will be able to generate additional intelligence surrounding a threat and proactively identify likely malicious domains as they are registered or become active on the blockchain.
A presentation about MySQL for beginners. It includes the following topics:
- Introduction
- Installation
- Executing SQL statements
- SQL Language Syntax
- The most important SQL commands
- MySQL Data Types
- Operators
- Basic Syntax
- SQL Joins
- Some Exercise
Day 1 : Slides for my training course, Well Grounded Python Coding. I'm using PyCharm Pro and Anaconda along the course. Not much to read but it's the main material for my teaching.
Day 1 Slide Handout for my training course, Well Grounded Python Coding. I'm using PyCharm Pro and Anaconda along the course. Not much to read but it's the main material for my teaching.
Covered:
1. Databases and Schemas
2. Tablespaces
3. Data Type
4. Exploring Databases
5. Locating the database server's message log
6. Locating the database's system identifier
7. Listing databases on this database server
8. How much disk space does a table use?
9. Which are my biggest tables?
10. How many rows are there in a table?
11. Quickly estimating the number of rows in a table
12. Understanding object dependencies
Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Inf...Priyanka Aash
The Namecoin and Emercoin blockchains were designed to provide decentralized and takedown-resistant domain names to users with the reported goal of promoting free speech. By leveraging unofficial Top-Level Domains (TLDs) such as .bit and alternate DNS resolution methods such as the OpenNIC project, users can register and configure their own domains on these blockchains at a relatively cheap price.
In recent years, cybercriminals have adopted and abused this infrastructure and implemented it into well-known malware such as Dimnie, Smoke Loader, and Necurs as well as larger, more targeted workflows. The resiliency of blockchain techology prevents researchers and ISPs from taking down or sinkholing these domains. In addition, limited public knowledge of this threat in a larger context and the constraint of alternative DNS resolution mitigates an analyst's ability to map out related domains and IP addresses when malicious activity is identified.
On the other hand, blockchain-based infrastructure comes with a serious drawback: data added to or removed from these blockchains becomes a permanent record of a threat actor's activity. This talk is intended to leverage this attribute to tackle these issues, providing high and medium-confidence methodologies for mapping out these blockchains through TTP analysis, script-based transaction mapping, and index-based infrastructure correlation. In doing so, analysts will be able to generate additional intelligence surrounding a threat and proactively identify likely malicious domains as they are registered or become active on the blockchain.
A presentation about MySQL for beginners. It includes the following topics:
- Introduction
- Installation
- Executing SQL statements
- SQL Language Syntax
- The most important SQL commands
- MySQL Data Types
- Operators
- Basic Syntax
- SQL Joins
- Some Exercise
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
MySQL
1. Dr. D. P.
Mishra
Digitally signed by Dr. D. P.
Mishra
DN: cn=Dr. D. P. Mishra,
o=durg, ou=BIT,
email=dpmishra@bitdurg.ac.
in, c=IN
Date: 2023.04.10 14:01:56
+05'30'
2. hour=$(date +%H)
if [ $hour -ge 5 -a $hour -lt 12 ];
then
echo "Good morning, $USER!"
elif [ $hour -ge 12 -a $hour -lt 18 ];
then
echo "Good afternoon, $USER!"
else
echo "Good evening, $USER!"
fi
```
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
10.1 Shell script to wish according to day
time.
3. clear
option=y
while [ $option = y ]
do
echo "1. Symbolic mode 2.
Absolute mode"
echo "enter your choice"
read ch
case $ch in
echo;;
2) clear
echo "changing the permission is
absolute mode"
echo `pwd` contents are
ls -l
echo "enter the filename"
read fname
echo "enter the permission"
read permission
chmod $permission $fname
echo "after changind the file
permission"
ls –l
echo;;
esac
echo "do you want to continue y/n "
read option
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
10.2 Shell script to assign a file permission to a given file using
a) symbolic mode b) absolute mode
1) clear
echo "changing the file permission in
symbolic mode"
echo `pwd` contents are
ls -l
echo "enter the file name"
read fname
echo "enter the file type u/g/o"
read type
echo "enter one of the permission
r/w/x"
read permission
#changing the mode with given input
chmod $type+$permission $fname
echo "after changing the permission"
ls -l
5. Connecting to MySQL
MySQL provides an interactive shell fo creating tables,
inserting data, etc.
Mysql or
mysql -u user -p;
Note : $ sudo - i
Provide Password : BitDurg#123
# mysql
mysql>
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
6. To exit the MySQL Shell, just type QUIT or
EXIT:
mysql>
mysql> QUIT
mysql> exit
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
7. Basic Queries
• Once logged in, you can try some simple queries.
• For example:
mysql> SELECT VERSION(), CURRENT_DATE;
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
8. Basic Queries ..
•Keywords may be entered in any lettercase.
•The following queries are equivalent:
mysql> SELECT VERSION(), CURRENT_DATE;
mysql> select version(), current_date;
mysql> SeLeCt vErSiOn(), current_DATE;
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
9. Basic Queries …
• Here's another query. It demonstrates that
• you can use mysql as a simple calculator:
mysql> SELECT SIN(PI()/4), (4+1)*5;
+-------------+---------+
| SIN(PI()/4) |(4+1)*5 |
+-------------+---------+
| 0.707107 | 25 |
+-------------+---------+
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
10. Basic Queries ….
• You can also enter multiple statements on a single
• line. Just end each one with a semicolon:
mysql> SELECT VERSION(); SELECT NOW();
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
11. Multi-Line Commands
• mysql determines where your statement ends by looking for the
terminating semicolon, not by looking for the end of the input line.
• Here's a simple multiple-line statement:
mysql> SELECT
-> USER()
-> ,
-> CURRENT_DATE;
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
13. Cancelling a Command
• If you decide you don't want to execute a command that you are in the
process of entering, cancel it by typing c
mysql> SELECT
-> USER()
-> c
mysql>
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
14. Info about databases and tables
Listing the databases on the MySQL server host
mysql>show databases;
Access/change database
mysql>Use [database_name]
Showing the current selected database
mysql> select database();
Showing tables in the current database
mysql>show tables;
Showing the structure of a table
mysql> describe [table_name];
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
15. Using Database
• To get started on your own database, first check which databases
currently exist.
• Use the SHOW statement to find out which databases currently exist
on the server
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
16. Creating & Using Database
• To create a new database, issue the “create database” command:
mysql> create database webdb;
• Note: Database names are case sensitive
• To the select a database, issue the “use” command:
mysql> use webdb;
To see what database is selected
mysql> select database();
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
17. Creating a Table
• Once you have selected a database, you can view all database tables:
mysql> show tables;
Empty set (0.02 sec)
• An empty set indicates that I have not created any tables yet.
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
18. • Let’s create a table for storing pets.
• Table: pets
• name: VARCHAR(20)
• owner: VARCHAR(20)
• species: VARCHAR(20)
• sex: CHAR(1)
• birth: DATE
• date: DATE
• VARCHAR is usually used to store
string data.
mysql> CREATE TABLE pet (
-> name VARCHAR(20),
-> owner VARCHAR(20),
-> species VARCHAR(20),
-> sex CHAR(1),
-> birth DATE, death DATE);
Query OK, 0 rows affected (0.04
sec)
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
Creating a Table..
19. Showing Tables
• To verify that the table has been created:
mysql> show tables;
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
20. Describing table
• To view a table structure, use the DESCRIBE command:
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
21. Deleting a Table
• To delete an entire table, use the DROP TABLE command:
mysql> drop table pet;
Query OK, 0 rows affected (0.02 sec)
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
22. Inserting Data
•Use the INSERT statement to enter data into a table.
•For example:
INSERT INTO pet VALUES
('Puffball','Diane','hamster','f',
'1999-03-30',NULL);
•The next slide shows a full set of sample data.
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
24. Loading Sample Data
• You could create a text file `pet.txt‘ containing one record per line.
• Values must be separated by tabs, and given in the order in which the
columns were listed in the CREATE TABLE statement.
• Then load the data via the LOAD DATA Command.
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
25. Sample Data File
To Load pet.txt:
mysql> LOAD DATA LOCAL INFILE "pet.txt" INTO TABLE pet;
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
26. Manipulating table instances
•Remove records of a table
– mysql> DELETE FROM tableName;
– [WHERE where_condition];
•Update records of a table
– UPDATE pet SET birth = '1989-
08-31' WHERE name ='Bowser';
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
27. SQL Select
• The SELECT statement is used to pull information from a table.
• The general format is:
SELECT what_to_select
FROM which_table
WHERE conditions_to_satisfy
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
29. Selecting Particular Rows
• You can select only particular rows from your table.
• For example, if you want to verify the change that you made to
Bowser's birth date, select Bowser's record like this:
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
30. Selecting Particular Rows
• To find all animals born after 1998
SELECT * FROM pet WHERE birth >= "1998-1-1";
• To find all female dogs, use a logical AND
SELECT * FROM pet WHERE species = "dog" AND sex = "f";
• To find all snakes or birds, use a logical OR
SELECT * FROM pet WHERE species = "snake" OR species = "bird";
• AND has higher precedence than OR → Use parenthesis if necessary
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
32. Sorting Data
• To sort data use order by clause , ex : to view animals birthdays, sorted
by birth
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
33. Sorting in reverse order
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
34. Selecting Particular Row
• Find out who owns pets
SELECT owner FROM pet;
• Find out who owns pets (without duplicate)
SELECT DISTINCT owner FROM pet;
• Get birth dates for male dogs and female cats
SELECT name, species, birth FROM pet WHERE (species = "dog"
AND sex=”m”) OR (species = "cat" AND sex=”f”);
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
35. Pattern Matching Examples
• To find names beginning with ‘b’:
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
36. Pattern matching ..
• Finding the names ending with ‘fy’
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
37. Pattern Matching ..
• Finding name containing ‘w’
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
39. Counting Rows Example ..
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg
40. Selecting Particular Rows
• Find out number of animals per species
SELECT species, count(*) FROM pet GROUP BY species;
• Find out number of animals per sex
SELECT sex, count(*) FROM pet GROUP BY sex;
• Find out number of animals per combination of species and sex
SELECT species, sex, count(*) FROM pet GROUP BY species, sex;
Linux
Laboratory
-
B.Tech.
6th
CSE
-
Dr.
D.
P.
Mishra,
BIT
Durg