Flylib.com
List of Tables
Previous page
Table of content
Next page
Module 1: Installing MySQL
Table 1-1: Common Terms Used with Databases
Module 2: Defining a Database
Table 2-1: Data Types in MySQL
Table 2-2: Integer Types in MySQL with Sizes and Ranges
Table 2-3: Data Changed by Field Syntax When 123.4567 Is Inserted
Table 2-4: Ranges for Signed FLOAT and DOUBLE Data Types
Table 2-5: TEXT and BLOB Data Type Sizes and Upper Limits (in Bytes)
Table 2-6: Date and Time Sizes, Formats, and Ranges
Table 2-7: Effects of Narrowing the TIMESTAMP Field in MySQL Versions Prior to 4.1
Table 2-8: Size, Range, and Formats for YEAR and TIME
Table 2-9: Storage Comparisons of ENUM and SET
Table 2-10: Initial Fields for the DuckWear Customer Table (duck_cust)
Table 2-11: MySQL Table Types
Table 2-12: Pros and Cons of Using Transactional Tables (BDB and InnoDB)
Table 2-13
Module 4: Basic Reporting
Table 4-1: Commands That Focus on Areas of the Database
Table 4-2: Some Variations of the WHERE Syntax
Table 4-3: Comparison Operators for the WHERE Clause
Module 5: Advanced Reporting
Table 5-1: Field Names and Types for the StatesPop Table
Table 5-2: Rounding Functions on Positive and Negative Numbers
Table 5-3: DATE_FORMAT Specifiers
Table 5-4: Data for the duck_sales Table
Module 7: Interfacing with Programs
Table 7-1: Variations of the PHP mysql_fetch Function
Module 8: Basic Administration and Backups
Table 8-1: MySQL Privilege Types
Table 8-2: Options for the CHECK TABLES Command
Table 8-3: Commonly Used Checking and Repairing Options for myisamchk
Appendix B: Reserved Words
Table B-1: Reserved Words
Appendix C: PHP Installation and Basic Syntax
Table C-1: Escape Sequence Meanings
Table C-2: Operators, with Their Precedence and Description
Previous page
Table of content
Next page
MySQL: Essential Skills
ISBN: 0072255137
EAN: 2147483647
Year: 2006
Pages: 109
Authors:
John Horn
,
Michael Grey
,
LLC Interstate Software
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
Definition of ADAM
Extended DN Queries
Modeling One-to-Many and Many-to-Many Relationships
Managing Passwords for ADAM Users
Error 0x8007203A: "The server is not operational."
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Writing a Member Function Template
Making an Initializer List Exception-Safe
Deleting or Renaming a File
Finding the Greatest or Least Value in a Container
Ensuring That a Member Function Doesnt Modify Its Object
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
show Commands
Loading Configuration Files
Interface show Commands
Specific Topics
Appendix A Network Basics
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 22. Digging to China
Hack 28. Experiment with Different Cartographic Projections
Hack 72. Add Relief to Your Topographic Maps
Hack 73. Make Your Own Contour Maps
Hack 81. Clean Up U.S. Addresses
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
The Working Directory
Why Write Scripts?
Using SQL*Plus Timers
Using EXPLAIN PLAN
Using the Product User Profile
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies