Flylib.com
List of Tables
Previous page
Table of content
Next page
Module 1: Installing MySQL
Table 1-1: Common Terms Used with Databases
Module 2: Defining a Database
Table 2-1: Data Types in MySQL
Table 2-2: Integer Types in MySQL with Sizes and Ranges
Table 2-3: Data Changed by Field Syntax When 123.4567 Is Inserted
Table 2-4: Ranges for Signed FLOAT and DOUBLE Data Types
Table 2-5: TEXT and BLOB Data Type Sizes and Upper Limits (in Bytes)
Table 2-6: Date and Time Sizes, Formats, and Ranges
Table 2-7: Effects of Narrowing the TIMESTAMP Field in MySQL Versions Prior to 4.1
Table 2-8: Size, Range, and Formats for YEAR and TIME
Table 2-9: Storage Comparisons of ENUM and SET
Table 2-10: Initial Fields for the DuckWear Customer Table (duck_cust)
Table 2-11: MySQL Table Types
Table 2-12: Pros and Cons of Using Transactional Tables (BDB and InnoDB)
Table 2-13
Module 4: Basic Reporting
Table 4-1: Commands That Focus on Areas of the Database
Table 4-2: Some Variations of the WHERE Syntax
Table 4-3: Comparison Operators for the WHERE Clause
Module 5: Advanced Reporting
Table 5-1: Field Names and Types for the StatesPop Table
Table 5-2: Rounding Functions on Positive and Negative Numbers
Table 5-3: DATE_FORMAT Specifiers
Table 5-4: Data for the duck_sales Table
Module 7: Interfacing with Programs
Table 7-1: Variations of the PHP mysql_fetch Function
Module 8: Basic Administration and Backups
Table 8-1: MySQL Privilege Types
Table 8-2: Options for the CHECK TABLES Command
Table 8-3: Commonly Used Checking and Repairing Options for myisamchk
Appendix B: Reserved Words
Table B-1: Reserved Words
Appendix C: PHP Installation and Basic Syntax
Table C-1: Escape Sequence Meanings
Table C-2: Operators, with Their Precedence and Description
Previous page
Table of content
Next page
MySQL: Essential Skills
ISBN: 0072255137
EAN: 2147483647
Year: 2006
Pages: 109
Authors:
John Horn
,
Michael Grey
,
LLC Interstate Software
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.5 How to use OpenSSH Passphrase Agents
Step 4.7 Using Public Key Authentication for Automated File Transfers
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Invoking Call Pickup
Voice Mail Deployment Considerations
Configuring the AVT
Managing Cisco IPC Express with Cisco Partner Applications
Troubleshooting Voice Mail VPIM Networking
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
EIGRP
Route Filtering
Configuring a Simple DDR Connection
ping
A.3. IPv6
The Java Tutorial: A Short Course on the Basics, 4th Edition
Summary of Reading and Writing
Example Three: CelsiusConverter
Appendix B. Internet-Ready Applets
Code Samples
Path Help
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
3-D Layers from Photoshop Layers
Scale and Speed
Color, Light, and Focus
Custom Scene Transitions
Appendix Adobe Photoshop and After Effects Resources
What is Lean Six Sigma
Key #2: Improve Your Processes
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
Six Things Managers Must Do: How to Support Lean Six Sigma
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies