Flylib.com
List of Tables
Previous page
Table of content
Next page
Module 1: Installing MySQL
Table 1-1: Common Terms Used with Databases
Module 2: Defining a Database
Table 2-1: Data Types in MySQL
Table 2-2: Integer Types in MySQL with Sizes and Ranges
Table 2-3: Data Changed by Field Syntax When 123.4567 Is Inserted
Table 2-4: Ranges for Signed FLOAT and DOUBLE Data Types
Table 2-5: TEXT and BLOB Data Type Sizes and Upper Limits (in Bytes)
Table 2-6: Date and Time Sizes, Formats, and Ranges
Table 2-7: Effects of Narrowing the TIMESTAMP Field in MySQL Versions Prior to 4.1
Table 2-8: Size, Range, and Formats for YEAR and TIME
Table 2-9: Storage Comparisons of ENUM and SET
Table 2-10: Initial Fields for the DuckWear Customer Table (duck_cust)
Table 2-11: MySQL Table Types
Table 2-12: Pros and Cons of Using Transactional Tables (BDB and InnoDB)
Table 2-13
Module 4: Basic Reporting
Table 4-1: Commands That Focus on Areas of the Database
Table 4-2: Some Variations of the WHERE Syntax
Table 4-3: Comparison Operators for the WHERE Clause
Module 5: Advanced Reporting
Table 5-1: Field Names and Types for the StatesPop Table
Table 5-2: Rounding Functions on Positive and Negative Numbers
Table 5-3: DATE_FORMAT Specifiers
Table 5-4: Data for the duck_sales Table
Module 7: Interfacing with Programs
Table 7-1: Variations of the PHP mysql_fetch Function
Module 8: Basic Administration and Backups
Table 8-1: MySQL Privilege Types
Table 8-2: Options for the CHECK TABLES Command
Table 8-3: Commonly Used Checking and Repairing Options for myisamchk
Appendix B: Reserved Words
Table B-1: Reserved Words
Appendix C: PHP Installation and Basic Syntax
Table C-1: Escape Sequence Meanings
Table C-2: Operators, with Their Precedence and Description
Previous page
Table of content
Next page
MySQL: Essential Skills
ISBN: 0072255137
EAN: 2147483647
Year: 2006
Pages: 109
Authors:
John Horn
,
Michael Grey
,
LLC Interstate Software
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 3.1 Use PuTTY as a Graphical Replacement for telnet and rlogin
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 4.7 Using Public Key Authentication for Automated File Transfers
Conclusion
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Forming Your Kanban Team
Appendix A MRP vs. Kanban
Appendix C Two-Bin Kanban Systems
Appendix E EOQ vs. Kanban
Appendix H Case Study 1: Motor Plant Casting Kanban
Cisco CallManager Fundamentals (2nd Edition)
International Numbering Plans
Station Devices
VoIP Gateway Security
Summary
Storage and Maintenance of CDR Data
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Getting to Know AutoCAD
Using Layers to Organize Your Drawing
Working with Hatches and Fills
Controlling Text in a Drawing
Managing External References
Special Edition Using FileMaker 8
FileMaker Extra: Incorporating Reports into the Workflow
Getting Out What You Put In
Custom Web Publishing
Runtime Solutions
Automatically Updating Plug-ins
Programming .Net Windows Applications
Overview
The Forms Namespace
Controls: The Base Class
Text and Fonts
Updating ADO.NET
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies