The document is an introduction to SQL that covers the basic SQL statements and concepts. It defines SQL and its uses, including retrieving, inserting, updating, and deleting data from databases. It also covers key SQL statements like SELECT, WHERE, ORDER BY, JOIN, and aggregate functions. The document provides syntax examples for each SQL statement and concept discussed.
Introduction to SQL (for Chicago Booth MBA technology club)Jennifer Berk
Introduction to SQL for MBA students, presented spring 2012 to the Chicago Booth technology club.
Why an MBA would want to know SQL, a sandbox to practice in, and the basics of SQL syntax so you can pull your own datasets to analyze.
Consists of the explanations of the basics of SQL and commands of SQL.Helpful for II PU NCERT students and also degree studeents to understand some basic things.
Data Definition Language (DDL), Data Definition Language (DDL), Data Manipulation Language (DML) , Transaction Control Language (TCL) , Data Control Language (DCL) - , SQL Constraints
An introduction to SQL standard language for beginners and non-technical information people. Mostly covers SELECT statement using standard clauses, Joins, Sub-Queries and ...
Introduction to SQL (for Chicago Booth MBA technology club)Jennifer Berk
Introduction to SQL for MBA students, presented spring 2012 to the Chicago Booth technology club.
Why an MBA would want to know SQL, a sandbox to practice in, and the basics of SQL syntax so you can pull your own datasets to analyze.
Consists of the explanations of the basics of SQL and commands of SQL.Helpful for II PU NCERT students and also degree studeents to understand some basic things.
Data Definition Language (DDL), Data Definition Language (DDL), Data Manipulation Language (DML) , Transaction Control Language (TCL) , Data Control Language (DCL) - , SQL Constraints
An introduction to SQL standard language for beginners and non-technical information people. Mostly covers SELECT statement using standard clauses, Joins, Sub-Queries and ...
2° Ciclo Microsoft CRUI 3° Sessione: l'evoluzione delle piattaforme tecnologi...Jürgen Ambrosi
L’obiettivo è quello di fare una panoramica dello stato dell’arte sulle tecnologie a supporto dei database. Alcuni esempi sono la tecnologia in-memory integrata con le funzionalità di analisi operative in tempo reale e della tecnologia Always Encrypted per la protezione dei dati utilizzati in locale o durante gli spostamenti. La tecnologia in-memory consente di migliorare di 30 volte le performance delle transazioni utilizzando hardware standard di settore. Inoltre i Big Data e l'analisi sono diventati un importante fattore di differenziazione competitivo, ma la gestione delle enormi quantità di dati correlate a un tempo di attività 24 ore su 24 continua a essere una sfida per l'IT. Oggi è più importante che mai soddisfare a livello aziendale l'esigenza di prestazioni, disponibilità e sicurezza efficace per gestire carichi di lavoro mission-critical a un costo contenuto. Le soluzioni Microsoft fissano un nuovo standard nelle performance mission-critical.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
4. SQL Intro
What is SQL?
SQL stands for Structured Query Language
SQL lets you access and manipulate databases
SQL is an ANSI (American National Standards Institute) standard
What Can SQL do?
SQL can execute queries against a database
SQL can retrieve data from a database
SQL can insert records in a database
SQL can update records in a database
SQL can delete records from a database
SQL can create new databases
SQL can create new tables in a database
SQL can create stored procedures in a database
SQL can create views in a database
SQL can set permissions on tables, procedures, and views
What is RDBMS?
RDBMS stands for Relational Database Management System.
RDBMS is the basis for SQL, and for all modern database systems such as MS SQL Server,
IBM DB2, Oracle, MySQL, and Microsoft Access.
The data in RDBMS is stored in database objects called tables.
A table is a collection of related data entries and it consists of columns and rows.
SQL
Page 3
5. SQL Select
Definition
The SELECT statement is used to select data from a database.
The result is stored in a result table, called the result-set.
Syntax
SELECT column_name
FROM table_name;
Example
SELECT City FROM Customers;
SQL Select Distinct
Definition
The SELECT DISTINCT statement is used to return only distinct
(different) values.
Syntax
SELECT DISTINCT column_name,column_name
FROM table_name;
Example
SELECT DISTINCT City FROM Customers;
SQL Where
Definition
The WHERE clause is used to filter records.
Syntax
SELECT column_name, column_name
FROM table_name
WHERE column_name operator value;
Example
SELECT * FROM Customers
WHERE Country='Mexico';
SQL
Page 4
6. SQL And & Or
The AND operator displays a record if both the first condition AND the
Definition
second condition are true.
The OR operator displays a record if either the first condition OR the
second condition is true.
Syntax
SELECT column_name, FROM table_name
WHERE column_name (AND/OR) column_name;
Example
SELECT * FROM Customers
WHERE Country='Germany' AND City='Berlin';
SQL Order By
Definition
Syntax
Example
The ORDER BY keyword is used to sort the result-set by one or more
columns.
SELECT column_name, column_name
FROM table_name
ORDER BY column_name, column_name ASC|DESC;
SELECT * FROM Customers
ORDER BY Country DESC;
SQL Insert Into
Definition
Syntax
Example
SQL
The INSERT INTO statement is used to insert new records in a table.
INSERT INTO table_name
VALUES (value1, value2, value3,...);
INSERT INTO table_name (column1, column2, column3,...)
VALUES (value1, value2, value3,...);
INSERT INTO Customers (CustomerName, City, Country)
VALUES ('Cardinal', 'Stavanger', 'Norway');
Page 5
7. SQL Update
Definition
Syntax
Example
The UPDATE statement is used to update existing records in a table.
UPDATE table_name
SET column1=value1, column2=value2,...
WHERE some_column=some_value;
UPDATE Customers
SET ContactName='Alfred Schmidt', City='Hamburg'
WHERE CustomerName='Alfreds Futterkiste';
SQL Delete
Definition
The DELETE statement is used to delete rows in a table.
Syntax
DELETE FROM table_name
WHERE some_column=some_value;
Example
DELETE FROM Customers
WHERE CustomerName='Alfreds Futterkiste' AND
ContactName='Maria Anders';
SQL Select Top
Definition
Syntax
Example
SQL
The SELECT TOP clause is used to specify the number of records to
return.
SELECT TOP number|percent column_name(s)
FROM table_name;
SELECT TOP 2 * FROM Customers;
SELECT TOP 50 PERCENT * FROM Customers;
Page 6
8. SQL Select Top
Definition
Syntax
Example
The SELECT TOP clause is used to specify the number of records to
return.
SELECT TOP number|percent column_name(s)
FROM table_name;
SELECT TOP 2 * FROM Customers;
SELECT TOP 50 PERCENT * FROM Customers;
SQL Like
Definition
The LIKE operator is used to search for a specified pattern in a column.
Syntax
SELECT column_name(s)
FROM table_name
WHERE column_name LIKE pattern;
Example
SELECT * FROM Customers
WHERE City LIKE 's%';
SQL Wildcards
Definition
Wildcard characters are used with the SQL LIKE operator. They are used
Syntax
to search for data within a table.
SELECT column_name(s)
FROM table_name
WHERE column_name LIKE pattern;
SELECT * FROM Customers
WHERE City LIKE 'ber%';
Example
SELECT * FROM Customers
WHERE City LIKE '_erlin';
SELECT * FROM Customers
WHERE City LIKE '[!bsp]%';
SQL
Page 7
9. SQL IN
Definition
The IN operator allows you to specify multiple values in a WHERE clause.
Syntax
SELECT column_name(s)
FROM table_name
WHERE column_name IN (value1,value2,...);
Example
SELECT * FROM Customers
WHERE City IN ('Paris','London');
SQL Between
Definition
The BETWEEN operator selects values within a range. The values can be
Syntax
numbers, text, or dates.
SELECT column_name(s)
FROM table_name
WHERE column_name BETWEEN value1 AND value2;
SELECT * FROM Products
WHERE Price BETWEEN 10 AND 20;
Example
SELECT * FROM Products
WHERE Price NOT BETWEEN 10 AND 20;
SELECT * FROM Orders
WHERE OrderDate BETWEEN #07/04/1996# AND #07/09/1996#;
SQL Join
Definition
Syntax
Example
SQL
An SQL JOIN clause is used to combine rows from two or more tables,
based on a common field between them.
SELECT column_name(s)
FROM table1
JOIN table2
ON table1.column_name=table2.column_name;
SELECT Orders.OrderID, Customers.CustomerName,
Orders.OrderDate
FROM Orders
JOIN Customers
ON Orders.CustomerID=Customers.CustomerID;
Page 8
10. SQL Inner Join
The INNER JOIN keyword selects all rows from both tables as long as
Definition
Syntax
Example
there is a match between the columns in both tables. INNER JOIN is
the same as JOIN.
SELECT column_name(s)
FROM table1
JOIN table2
ON table1.column_name=table2.column_name;
SELECT Customers.CustomerName, Orders.OrderID
FROM Customers
INNER JOIN Orders
ON Customers.CustomerID=Orders.CustomerID
ORDER BY Customers.CustomerName;
SQL Left Join
The LEFT JOIN keyword returns all rows from the left table (table1),
Definition
Syntax
Example
with the matching rows in the right table (table2). The result is NULL
in the right side when there is no match.
SELECT column_name(s)
FROM table1
LEFT JOIN table2
ON table1.column_name=table2.column_name;
SELECT Customers.CustomerName, Orders.OrderID
FROM Customers
LEFT JOIN Orders
ON Customers.CustomerID=Orders.CustomerID
ORDER BY Customers.CustomerName;
SQL Right Join
The RIGHT JOIN keyword returns all rows from the right table
Definition
Syntax
Example
SQL
(table2), with the matching rows in the left table (table1). The result
is NULL in the left side when there is no match.
SELECT column_name(s)
FROM table1
RIGHT JOIN table2
ON table1.column_name=table2.column_name;
SELECT Orders.OrderID, Employees.FirstName
FROM Orders
RIGHT JOIN Employees
ON Orders.EmployeeID=Employees.EmployeeID
ORDER BY Orders.OrderID;
Page 9
11. SQL Full Join
Definition
Syntax
Example
The FULL OUTER JOIN keyword returns all rows from the left table
(table1) and from the right table (table2).
SELECT column_name(s)
FROM table1
FULL OUTER JOIN table2
ON table1.column_name=table2.column_name;
SELECT Customers.CustomerName, Orders.OrderID
FROM Customers
FULL OUTER JOIN Orders
ON Customers.CustomerID=Orders.CustomerID
ORDER BY Customers.CustomerName;
SQL Union
Definition
Syntax
Example
The SQL UNION operator combines the result of two or more SELECT
statements.
SELECT column_name(s) FROM table1
UNION
SELECT column_name(s) FROM table2;
SELECT City FROM Customers
UNION
SELECT City FROM Suppliers
ORDER BY City;
SQL Select Into
Definition
Syntax
Example
SQL
The SELECT INTO statement selects data from one table and inserts it
into a new table.
SELECT *
INTO newtable [IN externaldb]
FROM table1;
SELECT *
INTO CustomersBackup2013
FROM Customers;
Page 10
12. SQL Insert Into Select
Definition
Syntax
Example
The INSERT INTO SELECT statement copies data from one table and
inserts it into an existing table.
INSERT INTO table2
SELECT * FROM table1;
INSERT INTO table2
(column_name(s))
SELECT column_name(s)
FROM table1;
INSERT INTO Customers (CustomerName, Country)
SELECT SupplierName, Country FROM Suppliers;
INSERT INTO Customers (CustomerName, Country)
SELECT SupplierName, Country FROM Suppliers
WHERE Country='Germany';
SQL Create Database
Definition
The CREATE DATABASE statement is used to create a database.
Syntax
CREATE DATABASE dbname;
Example
CREATE DATABASE my_db;
SQL Create Table
The CREATE TABLE statement is used to create a table in a database.
Definition
Syntax
SQL
Tables are organized into rows and columns; and each table must have a
name.
CREATE TABLE table_name
(
column_name1 data_type(size),
column_name2 data_type(size),
column_name3 data_type(size),
....
);
Page 11
13. Example
CREATE TABLE Persons
(
PersonID int,
LastName varchar(255),
FirstName varchar(255),
Address varchar(255),
City varchar(255)
);
SQL Constraints
Definition
Syntax
Example
SQL constraints are used to specify rules for the data in a table.
CREATE TABLE table_name
(
column_name1 data_type(size) constraint_name,
column_name2 data_type(size) constraint_name,
column_name3 data_type(size) constraint_name,
....
);
NOT NULL- Indicates that a column cannot store NULL value.
UNIQUE- Ensures that each row for a column must have a unique
value.
PRIMARY KEY- A combination of a NOT NULL and UNIQUE. Ensures
that a column (or combination of two or more columns) have an
unique identity which helps to find a particular record in a
table more easily and quickly.
FOREIGN KEY- Ensure the referential integrity of the data in
one table to match values in another table
CHECK- Ensures that the value in a column meets a specific
condition.
DEFAULT- Specifies a default value when specified none for
this column.
SQL Not Null
Definition
Example
SQL
The NOT NULL constraint enforces a column to NOT accept NULL
values.
CREATE TABLE Persons NotNull
(
P_Id int NOT NULL,
LastName varchar(255) NOT NULL,
FirstName varchar(255),
Address varchar(255),
City varchar(255)
)
Page 12
14. SQL Unique
Definition
Example
The UNIQUE constraint uniquely identifies each record in a database
table.
CREATE TABLE Persons Unique
(
P_Id int NOT NULL,
LastName varchar(255) NOT NULL,
FirstName varchar(255),
Address varchar(255),
City varchar(255),
UNIQUE (P_Id)
)
SQL Primary Key
The PRIMARY KEY constraint uniquely identifies each record in a
database table.
Definition
Primary keys must contain unique values.
A primary key column cannot contain NULL values.
Each table should have a primary key, and each table can have only ONE
Example
SQL
primary key.
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(255) NOT NULL,
FirstName varchar(255),
Address varchar(255),
City varchar(255),
PRIMARY KEY (P_Id)
)
Page 13
15. SQL Foreign Key
Definition
Example
A FOREIGN KEY in one table points to a PRIMARY KEY in another
table.
CREATE TABLE Orders
(
O_Id int NOT NULL,
OrderNo int NOT NULL,
P_Id int,
PRIMARY KEY (O_Id),
FOREIGN KEY (P_Id) REFERENCES Persons(P_Id)
)
SQL Check
Definition
Example
The CHECK constraint is used to limit the value range that can be
placed in a column.
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(255) NOT NULL,
FirstName varchar(255),
Address varchar(255),
City varchar(255),
CHECK (P_Id>0)
)
SQL Default
The DEFAULT constraint is used to insert a default value into a column.
Definition
Example
SQL
The default value will be added to all new records, if no other value is
specified.
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(255) NOT NULL,
FirstName varchar(255),
Address varchar(255),
City varchar(255),
CHECK (P_Id>0)
)
Page 14
16. SQL Create Index
The CREATE INDEX statement is used to create indexes in tables.
Definition
Indexes allow the database application to find data fast; without reading
the whole table.
Syntax
CREATE INDEX index_name
ON table_name (column_name)
Example
CREATE INDEX PIndex
ON Persons (LastName)
SQL Drop
The DROP statement is used to delete a table or database.
Definition
Syntax
Example
TRANCATE statement is when we only want to delete the data inside
the table, and not the table itself.
DROP TABLE table_name
DROP DATABASE database_name
TRUNCATE TABLE table_name
DROP TABLE Person
DROP DATABASE test
Truncate TABLE Person
SQL Alter
Definition
The ALTER TABLE statement is used to add, delete, or modify columns
Syntax
ALTER TABLE table_name
ADD column_name datatype
Example
ALTER TABLE Persons
DROP COLUMN DateOfBirth
SQL
in an existing table.
Page 15
17. SQL Null
NULL values represent missing unknown data.
Definition
By default, a table column can hold NULL values.
Note: It is not possible to compare NULL and 0; they are not
Syntax
Example
SQL
equivalent.
SELECT column_name FROM table
WHERE column_name IS NULL
SELECT column_name FROM table
WHERE column_name IS NOT NULL
SELECT LastName,FirstName,Address FROM Persons
WHERE Address IS NULL
SELECT LastName,FirstName,Address FROM Persons
WHERE Address IS NOT NULL
Page 16
18. SQL General Data Types
Database Type
Description
CHARACTER(n)
Character string. Fixed-length n
VARCHAR(n) or
CHARACTER VARYING(n)
BINARY(n)
Character string. Variable length. Maximum
length n
Binary string. Fixed-length n
BOOLEAN
Stores TRUE or FALSE values
VARBINARY(n) or
BINARY VARYING(n)
INTEGER(p)
Binary string. Variable length. Maximum length
n
Integer numerical (no decimal). Precision p
SMALLINT
Integer numerical (no decimal). Precision 5
INTEGER
Integer numerical (no decimal). Precision 10
BIGINT
Integer numerical (no decimal). Precision 19
DECIMAL(p,s)
REAL
Exact numerical, precision p, scale s. Example:
decimal(5,2) is a number that has 3 digits
before the decimal and 2 digits after the
decimal
Exact numerical, precision p, scale s. (Same as
DECIMAL)
Approximate numerical, mantissa precision p. A
floating number in base 10 exponential
notation. The size argument for this type
consists of a single number specifying the
minimum precision
Approximate numerical, mantissa precision 7
FLOAT
Approximate numerical, mantissa precision 16
DOUBLE PRECISION
Approximate numerical, mantissa precision 16
DATE
Stores year, month, and day values
TIME
Stores hour, minute, and second values
TIMESTAMP
Stores year, month, day, hour, minute, and
second values
Composed of a number of integer fields,
representing a period of time, depending on the
type of interval
A set-length and ordered collection of elements
NUMERIC(p,s)
FLOAT(p)
INTERVAL
ARRAY
MULTISET
XML
SQL
A variable-length and unordered collection of
elements
Stores XML data
Page 17