Premium Essay

Sql for Beginners

In:

Submitted By jeffonedu
Words 19188
Pages 77
An

Training Guide

SQL & SQL*Plus for Beginners

Training Guide
SQL & SQL*Plus for Beginners

www.appltop.com info@appltop.com

Course Introduction

Copyright © 1999 – 2004 ApplTop Solutions Limited

2

Training Guide
SQL & SQL*Plus for Beginners

www.appltop.com info@appltop.com

Course Objectives
This course is designed to give each delegate a basic understanding/awareness of the following... • Oracle SQL • Oracle SQL*Plus

Copyright © 1999 – 2004 ApplTop Solutions Limited

3

Training Guide
SQL & SQL*Plus for Beginners

www.appltop.com info@appltop.com

Course Objectives
This course is designed to give each delegate a basic understanding of the following topics... • Oracle SQL. You will learn how to use the industry standard tool for working with a Relational Database. You will also learn many other things, from constructing simple queries to creating your own tables. • Oracle SQL*Plus. After the course you should have a good understanding of SQL*Plus, from starting it, to creating simple reports on it. During the course there will be several exercises to complete.

Copyright © 1999 – 2004 ApplTop Solutions Limited

4

Training Guide
SQL & SQL*Plus for Beginners

www.appltop.com info@appltop.com

Note that this guide is meant only as an introduction to SQL and SQL*Plus and therefore much of the newer, more advanced features available in Oracle databases 8i, 9i and 10g are not covered.

Copyright © 1999 – 2004 ApplTop Solutions Limited

5

Training Guide
SQL & SQL*Plus for Beginners

www.appltop.com info@appltop.com

Course Contents 1 – Getting Started 11
12 19

RDB – A quick refresher What are SQL & SQL*Plus?

2 – Introduction to SQL & SQL*Plus
Introduction to SQL DML or DDL? Starting SQL*Plus Lab 1 Entering SQL Commands Basic Query Block Selecting Specific Columns Arithmetic Operators Column

Similar Documents

Premium Essay

Information Technology

...STRUCTURED QUERY LANGUAGE (SQL) STRUCTURED QUERY LANGUAGE: SQL is a language used for getting information when used from a database and even updating the information from a database. SQL is certified by both American National Standard Institute and ISO standard and much of the database products support SQL. It is a Data Sub Language and used by a combination of two languages. They are: Data Definition Language (DDL) and Data Manipulation Language (DML) and the main way to access data are by using a DML command. SQL language was created in the IBM laboratories where new software was created and it is called System R. So in order to manage the entire data which is stored in System R the SQL language was created. Before SQL was named as SEQUEL and later it was renamed it as SQL. SQL widely supports users who are using distributed databases because it can run on different computer networks. SQL serves both industry and academic needs. With more advancement of the database technology SQL applications are used for their regular use. For example: MySQL, SQLite, PostgreSQL and Oracle. SQL developers develop some commands to the corresponding database management systems and it is usually executed by a SQL command-line interface (CLI). It uses a set of commands like Insert, select, update, delete, create and drop. SELECT COMMAND: The SQL SELECT command is used to select data from a given SQL DATABASE. It is used to retrieve...

Words: 1156 - Pages: 5

Premium Essay

Database Analysis

...The Home Depot and Lowes stores as a countertop and cabinet manufacturer. This small business currently covers all South Florida and part of the Treasure Coast. The Countertop Guys uses a SQL Database to keep up with the manufacturing, customer service and work order processing. The database application used is Filemaker Pro and this application enables the users to keep track of work orders status, material daily production reports among others. Microsoft SQL Server also allows user-defined composite types (UDTs) to be defined and used. It also makes server statistics available as virtual tables and views (called Dynamic Management Views or DMVs). In addition to tables, a database can also contain other objects including views, stored procedures, indexes and constraints, along with a transaction log. A SQL Server database can contain a maximum of 231 objects, and can span multiple OS-level files with a maximum file size of 220 TB. The data in the database are stored in primary data files with an extension .mdf. Secondary data files, identified with an .ndf extension, are used to store optional metadata. Log files are identified with the .ldf extension. Storage space allocated to a database is divided into sequentially numbered pages, each 8 KB in size. A page is the basic unit of I/O for SQL Server operations. A page is marked with a 96-byte header which stores metadata about the page including the page number, page type, free space on the page and the ID of the object that...

Words: 930 - Pages: 4

Premium Essay

Database Security

...Individual Project Key Assignment Chris Pangburn 27 April, 2015 Table of Contents Week 1: Database Security Architecture 4 Differentiate between a Database Management System and a database 4 Network Infrastructure for the best security posture 4 Additional Security mechanisms to protect the Database Server 6 Week 2: User Account Security 7 Creating Schemas 7 Creating Users, Creating Roles, Assigning Privileges based on Access Control Lists 7 Creating Views 10 Week 3: Database Vulnerabilities 11 Description of tools used to perform scans 11 Scan Information 11 False Positive Information 12 Discuss SQL injection attack 12 Week 4: Auditing Techniques 14 Security hardened network design 14 Research of auditing features 14 Description of a trigger 14 Implementation of auditing 14 Week 5: Auditing Policies 15 Write SQL 15 Report based on access 15 Report based on system privileged 15 Audit report showing connection details 15 Report showing object access 15 References 16 Week 1: Database Security Architecture Differentiate between a Database Management System and a database Databases at their essence are nothing more than a collection of organized information (Mullins, 2013). A database can contain stored procedures, tables, fields, indexes, functions, views, security, and many other objects. Relationships between the data can be created which brings more meaning to how the data can be used and retrieved. Database Management...

Words: 1807 - Pages: 8

Free Essay

Unit 1 and Part of 2

...programming language called? Key Words 5. What are the short words that are used in assembly language called? Mnemonics 6. What is the difference between a compiler and an interpreter? A COMPILER is a program that translates a high-level language program into a separate machine language program. An INTERPRETER is a program that both translates and executes the instructions in a high-level language program 7. What type of software controls the internal operations of the computer’s hardware? OS’s Unit 1 Research Assignment 1. SQL It’s no surprise SQL (pronounced ‘sequel’) tops the job list since it can be found far and wide in various flavors. Database technologies such as MySQL, PostgreSQL and Microsoft SQL Server power big businesses, small businesses, hospitals, banks, universities. Indeed, just about every computer and person with access to technology eventually touches something SQL. For instance, all Android phones and iPhones have access to a SQL database called SQLite and many mobile apps developed Google, Skype and DropBox use it directly. 2. Java The tech community recently celebrated the 20th anniversary of Java. It’s one of the most widely adopted programming languages, used by some 9 million developers and running on 7 billion devices worldwide. It’s also the programming language used to develop all native Android apps. Java’s popularity with developers is due to the fact that the language is grounded in readability and simplicity. Java has staying power since...

Words: 1008 - Pages: 5

Premium Essay

Mr Mohammed

...Mohamed Helmy Mohamed 9 Ahmed Mokhtar st, Qibaa City, Gesr Alswis st, Cairo, Egypt Mobil: 0100 57 333 02 E-mail: Helmy_fighter@yahoo.com Objective: I am looking for a challenging position utilizing abilities developed through my experience and education, with the opportunity for professional growth based on performance. I feel that my heterogeneous experience has provided me with the ability to perform well under pressure, meeting deadlines and successfully achieving targets while effectively utilizing my management, business and technical skills as part of a team. Work Experience: - Oct 2010 Till Now Cairo University-Banha University Technical Analysis Fundamental Analysis Stock markets Futures & Options Assistant Lecture (Mandatory) Economics Finance Portfolio Management Forex - Sept 2014 ADMIRAL MARKETS INTERNATIONAL BROKERAGE SENIOR TECHNICAL ANALYST & FUTURES TRADER TRAINER - Dec 2012 VENUS INTERNATIONAL SENIOR TECHNICAL ANALYST & FUTURES TRADER (OPTIONS &COMMODITIES) - June 2009 ELHORREYA BROKERAGE SENIOR TECHNICAL ANALYST - Oct 2006 - Oct 2005 - Oct 2004 TECHNICAL ANALYST & OPERATION MANAGER. INTERNATIONAL SHARES & BONDS CENTER (ISBC) U.A.E LUXOR SECURITIES BROKERAGE & BOOK KEEPING EL-REBDI FOR STOCK EXCHANGE INVESTMENTS IN SAUDI ARABIA TECHNICAL ANALYST & FUNDAMENTAL ANALYST. TECHNICAL ANALYST & MONITORING & EXECUTION. Education: - Preparing (PHD) in Economics in Faculty of Commerce Ain-shams University Under Supervision of...

Words: 484 - Pages: 2

Premium Essay

Cv for My Success

...CURRICULUM VITAE Family status Summary Expansive business experience on Emerging markets Strong analytical and educational background Management experience Diverse work and life experience Experience 02/2010 – present Raiffeisen Bank International AG, Austria Credit management corporate, Director  Counterparty credit risk and underwriting management in European emerging markets with special focus on Russia and Ukraine.       12/2008 – 01/2010 Structuring complex corporate credit transactions such as LBOs and investment loans. Developing an advanced internal tool for calculating Risk weighted assets under both standardised and IRB approaches. Developing and implementing industry concept in credit risk management. Reporting large and complex transactions to the bank’s Credit committee and Management board. Exercising my own approval competences for approval of credit transactions. Mentoring junior professionals and trainees in the department. Raiffeisenbank AD, Bulgaria Corporate credit risk, Head of department  Managed a credit risk department of 10 risk professionals responsible for the largest corporate credit risk exposures.     Was a voting member of the bank’s credit committee with own approval authorities. Steering the credit committee meetings. Participated in risk related projects originated in head office improvement, Data Quality management, Regular risk reporting). Met National Supervisory in terms of IRB application status of the bank. (Rating...

Words: 567 - Pages: 3

Premium Essay

Apple/Starbucks

...Hi, My name is Thomas Rackley, I reside in Austin, TX. I was born in Miami, FL. I am currently a contractor where I work with SQL Server 2005 – 2014, Software development and Infrastructure. I’ve been working in the Information Technology field for over 22 years. I started out my major in Engineering but after my first computer class I was hooked. I received a BSCS from the University of Central Florida in1989.   I have worked in Information Technology for 22 years and always wanted to get my Master but never found the time to do it. I still do not have the time but if I don’t bite the bullet and try I will never accomplish getting a Masters. If I want to go after the CTO or CIO type positions a Master’s degree helps a lot in getting your foot in the door. Although I have a lot of IT experience I want to put that aside and learn as if I was a beginner. I want to advance my career in the information technology field where I can obtain the position of CIO or CTO. My expectations from this course are to be able to analyze the opportunities from a higher vantage point, one that is not buried so far in the details that the global aspect is ignored and to understand where the company is positioned in the global market and see changes that can advance the company into the future. I have had the opportunity to work in background investigations when it was first getting off the ground. I was the first IT person hired at Pinkerton Services Group which was eventually acquired by Choicepoint...

Words: 454 - Pages: 2

Premium Essay

Document

...reality in a way that supports processes requiring information. For example, modelling the availability of rooms in hotels in a way that supports finding a hotel with vacancies. Database management systems (DBMSs) are computer software applications that interact with the user, other applications, and the database itself to capture and analyze data. A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases. Well-known DBMSs include MySQL, PostgreSQL,Microsoft SQL Server, Oracle, SAP and IBM DB2. A database is not generally portable across different DBMSs, but different DBMSs can interoperate by using standards such asSQL and ODBC or JDBC to allow a single application to work with more than one DBMS. Database management systems are often classified according to the database modelthat they support; the most popular database systems since the 1980s have all supported the relational model as represented by the SQL language. Sometims a DBMS is loosely referred to as a "database".  database is a collection of information that is organized so that it can easily be accessed, managed, and updated. In one view, databases can be classified according to types of content: bibliographic, full-text, numeric, and images. In computing, databases are sometimes classified according to their organizational approach. The most prevalent approach is therelational database, a tabular database in which data is defined so that it can be reorganized...

Words: 4833 - Pages: 20

Free Essay

Php Tutorial

...PHP Tutorial From beginner to master PHP is a powerful tool for making dynamic and interactive Web pages. PHP is the widely-used, free, and efficient alternative to competitors such as Microsoft's ASP. In our PHP tutorial you will learn about PHP, and how to execute scripts on your server Pre-requisites Before you continue you should have a basic understanding of the following: • • HTML/XHTML JavaScript What is PHP? • • • • • • PHP stands for PHP: Hypertext Preprocessor PHP is a server-side scripting language, like ASP PHP scripts are executed on the server PHP supports many databases (MySQL, Informix, Oracle, Sybase, Solid, PostgreSQL, Generic ODBC, etc.) PHP is an open source software PHP is free to download and use What is a PHP File? • • • PHP files can contain text, HTML tags and scripts PHP files are returned to the browser as plain HTML PHP files have a file extension of ".php", ".php3", or ".phtml" What is MySQL? • • • • MySQL is a database server MySQL is ideal for both small and large applications MySQL supports standard SQL MySQL compiles on a number of platforms 1 • MySQL is free to download and use PHP + MySQL • PHP combined with MySQL are cross-platform (you can develop in Windows and serve on a Unix platform) Why PHP? • • • • PHP runs on different platforms (Windows, Linux, Unix, etc.) PHP is compatible with almost all servers used today (Apache, IIS, etc.) PHP is FREE to download from the official PHP resource:...

Words: 546 - Pages: 3

Premium Essay

Qwertyttter

...COMM 226 Database Systems INTRODUCTION A database is a structured collection of data, and is usually stored electronically to facilitate computerassisted search and retrieval. The electronic format allows different users to have views of the data that serve their particular needs. Furthermore, the database management software can ensure the consistency, integrity, and security of the database, provided the data needs of the organization have been correctly modeled and implemented. DATA MODELING Although the field of information systems engineering is young relative to most other engineering disciplines, it does apply formal modeling methods to study and predict aspects of a planned system. Different kinds of models may exhibit the user interfaces, behaviours, or data interchanges of the planned system. Modern businesses depend heavily on timely, trustworthy, and relevant data to provide a competitive advantage (Lau, 2010). As a result, organizations invest in modeling their enterprise data. Data models describe the logical and physical structure of data that the information systems maintain and process. The main goal of data modeling is to identify all of the data elements that the enterprise uses to manage its business, along with the structure and interrelationships of these elements. Data modeling typically follows activity modeling, which defines the functional requirements for the system. Its focus is to build a standard representation for the system’s data elements with...

Words: 2671 - Pages: 11

Premium Essay

Network Systems Administrator Tools

...BALTIMORE CITY COMMUNITY COLLEGE DIVISION OF BUSINESS, HEALTH, MATHEMATICS AND SCIENCE BUSINESS, MANAGEMENT AND TECHNOLOGY DEPARTMENT ITSA 255 – Information Systems Security Assignment 4 – Network System Administrator Tools/Utilities Students are to perform independent Internet research and write a short paragraph describing the functionality and utilization for each of the following Network System Administrator Tools/Utilities: * FileZilla FileZilla is a cross platform File Transfer Protocol (FTP) application software that allows the ability to transfer multiple files over the internet. It is made up of a FileZilla client and a FileZilla server. It is available for use with Windows, Linux and MAC OSX. It supports FTP, SFTP (SSH File Transfer protocol), FTPS (FTP secure). Some of the features include support in IPv6, Drag and Drop, Filename feature, Remote file editing, FTP proxy support and much more. It includes two methods to invoke security which is the explicit method and implicit method. Many bug fixes and vulnerability patches were made over the initial release of June 22, 2001. * Nessus Nessus is a open source cross-platform network vulnerability scanner software developed by Tenable Network Security. First introduced during 1998; it was created to be used as a free remote security scanner to the internet community. It allows for various scanning which scans a computer and raises an alert if it discovers any vulnerability that hackers could use...

Words: 856 - Pages: 4

Premium Essay

Electronic Ing

...Admirim Ymeri Jordan Misja, Tirana, Albania Telephone: +355 69 3919969 (mobile) e-mail: adiymeri@hotmail.com Summary • Very good knowledge on IT systems, global system analysis, developing, testing and managing of software in several programming languages. Software Engineering, Software Analyst, Database designer and Administrator in ORACLE, SQL Server DBMS, PostgreSQL, etc., Software Designer, Software Developer, Network and System Administrator. • Experience managing national level large scale IT projects. • Experience in software development, through the full cycle, for requirements analysis, detailed specifications, project planning, resource management, implementation, testing and beyond. • Fluency in English, Italian, Albanian with intermediate knowledge of French and German Experience Database Designing Consultancy 03/2010-present Immovable Property System (IPS) Land Administration and Management Project (LAMP) Immovable Property Registration Office (IPRO) • Develop and maintain the database, database applications, database interface functions (data entry forms and reports) and products. • Create, maintain, install, modify and test modules for the database and user interface of the IPS. • Prepare comprehensive written user manual/guideline to use, maintain and update the database produced. A first draft of the user manuals should be ready at the end of the...

Words: 776 - Pages: 4

Premium Essay

Happy

...M I C R O S O F T T E C H N O L O G Y A S S O C I AT E Student Study Guide EXAM 98-364 Database Administration Fundamentals Preparing for MTA Certification for Cert ca n Certification MICROSOFT TECHNOLOGY ASSOCIATE (MTA TECHNOLOGY ASSOCIATE (MTA) ECHNOLOGY C (MTA A) STUDENT STUDY GUIDE FOR DEVELOPERS UDY F DEVELOPERS 98-364 Database Administration Fundamentals Authors Peggy Fisher (Web Development and Database Administration). Peggy teaches computer science at a rural high school in central, Pennsylvania. Indian Valley High School offers courses in programming (C#, VB, and Java for the AP course), and Web design (Expression Web, HTML, JavaScript, and CSS). Peggy worked for a large insurance company outside Philadelphia, Pennsylvania, prior to leaving the corporate world to join the field of education. She has been at IVHS for the past eight years and truly enjoys her new career. Peggy also teaches part-time at Pennsylvania State University in the Continuing Education program. Her goal in teaching is to instill the love of learning so that her students will graduate and become lifelong learners. Peggy is the co-author of the Web Development Exam Review Kit in the MTA Exam Review Kit series. Patricia Phillips (Lead Author and Project Manager). Patricia taught computer science for 20 years in Janesville, Wisconsin. She served on Microsoft’s National K-12 Faculty Advisory Board and edited the Microsoft MainFunction website for technology teachers for two years...

Words: 11425 - Pages: 46

Premium Essay

Hostel Management Synopsis

...SYNOPSIS TITLE OF THE PROJECT HOSTEL MANAGEMENT SYSTEM PROBLEM STATEMENT This project needs to create the Hostel Management System (HMS) to organize the rooms, mess, student’s record and the other information about the students. All hostels without HMS are managed manually by the hostel office. And hence there is a lot of strain on the person who are running the hostel. This particular project deals with the problems on managing a hostel and avoids the problem which occur when carried manually. INTRODUCTION In hostels without a HMS all the things have to be done manually. The Registration form verification to the different data processing are done manually. Thus there are a lot of repetitions which can be easily avoided. Identification of the drawbacks of the existing system leads to the designing of computerized system that will be compatible to the existing system with the system which is more user friendly and more GUI oriented. We can improve the efficiency of the system, thus overcome the drawbacks of the existing system. Hostel management gives on idea about how the students details, room allocation, mess expenditure are maintained in the particular concern. The hostel management system also includes some special features like How many students can live in a room, and the students of the hostel can be recognized from their ID number. The administration has the unique identity for each members as well as students details. The stock management...

Words: 903 - Pages: 4

Premium Essay

Research

...MOBILE STORE MANAGEMENT SYSTEM _______________ A Thesis Presented to the Faculty of San Diego State University _______________ In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science _______________ by Park B. Patel Fall 2012 iii Copyright © 2012 by Park B. Patel All Rights Reserved iv DEDICATION Dedicated to My Mother Chetna Patel, Father Bharat Patel, Wife Komal Trivedi And Brother Jatan Patel v ABSTRACT OF THE THESIS Mobile Store Management System by Park B. Patel Master of Science in Computer Science San Diego State University, 2012 The Mobile Store Management System is software which can become the backbone for a billing and inventory system for small organizations. This software provides an uncomplicated system to run mobile stores. This application could be very useful to small organizations. This application is inspired from current pen and paper based store management systems. It will provide an easy and attractive interface so that the user can easily manage and utilize the application. Various other approaches were considered for this application. This application is designed in a way that it will only require a minimum amount of information from the user. The goal was to look for the minimum amount of information that will meet needed requirements. vi TABLE OF CONTENTS PAGE ABSTRACT ................................................................

Words: 10507 - Pages: 43