Flylib.com
List of Tables
Previous page
Table of content
Next page
Module 1: Installing MySQL
Table 1-1: Common Terms Used with Databases
Module 2: Defining a Database
Table 2-1: Data Types in MySQL
Table 2-2: Integer Types in MySQL with Sizes and Ranges
Table 2-3: Data Changed by Field Syntax When 123.4567 Is Inserted
Table 2-4: Ranges for Signed FLOAT and DOUBLE Data Types
Table 2-5: TEXT and BLOB Data Type Sizes and Upper Limits (in Bytes)
Table 2-6: Date and Time Sizes, Formats, and Ranges
Table 2-7: Effects of Narrowing the TIMESTAMP Field in MySQL Versions Prior to 4.1
Table 2-8: Size, Range, and Formats for YEAR and TIME
Table 2-9: Storage Comparisons of ENUM and SET
Table 2-10: Initial Fields for the DuckWear Customer Table (duck_cust)
Table 2-11: MySQL Table Types
Table 2-12: Pros and Cons of Using Transactional Tables (BDB and InnoDB)
Table 2-13
Module 4: Basic Reporting
Table 4-1: Commands That Focus on Areas of the Database
Table 4-2: Some Variations of the WHERE Syntax
Table 4-3: Comparison Operators for the WHERE Clause
Module 5: Advanced Reporting
Table 5-1: Field Names and Types for the StatesPop Table
Table 5-2: Rounding Functions on Positive and Negative Numbers
Table 5-3: DATE_FORMAT Specifiers
Table 5-4: Data for the duck_sales Table
Module 7: Interfacing with Programs
Table 7-1: Variations of the PHP mysql_fetch Function
Module 8: Basic Administration and Backups
Table 8-1: MySQL Privilege Types
Table 8-2: Options for the CHECK TABLES Command
Table 8-3: Commonly Used Checking and Repairing Options for myisamchk
Appendix B: Reserved Words
Table B-1: Reserved Words
Appendix C: PHP Installation and Basic Syntax
Table C-1: Escape Sequence Meanings
Table C-2: Operators, with Their Precedence and Description
Previous page
Table of content
Next page
MySQL: Essential Skills
ISBN: 0072255137
EAN: 2147483647
Year: 2006
Pages: 109
Authors:
John Horn
,
Michael Grey
,
LLC Interstate Software
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Reviewing Critical Systems and Information
Understanding the Attacker
Reducing the Risk of an Attack
Level I Assessments
Audit and Compliance
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
SWT/JFace Mechanisms
SWT Event Handling, Threading, and Displays
Trees
Scales, Sliders, and Progress Bars
SWT Graphics and Image Handling
C++ GUI Programming with Qt 3
Signals and Slots in Depth
Integrating Custom Widgets with Qt Designer
Using QHttp
TCP Networking with QSocket
Tooltips, Status Tips, and Whats This? Help
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Code Behind a Document
Working with the Dialog Object
Working with Outlook Objects
Working with the NameSpace Object
Advanced Topic: Inspecting the Generated Code
Extending and Embedding PHP
Summary
Returning Values by Reference
Working with Arrays and HashTables
Appendix A. A Zend API Reference
Appendix D. Additional Resources
.NET-A Complete Development Cycle
Getting Started
Visual Studio.NET: Platform of Choice
The Photo Editor Application
Implementation of the Photo Editor Application
E-mail, Password, Credit Card: Creating a Customer Profile
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies