SQL stands for the Structured Query Language. It is the standard language used to maintain the relational database and perform many different data manipulation operations on the data. SQL was initially invented in 1970. It is a database language used for database creation, deletion, fetching and modifying rows, etc. sometimes, it is pronounced as 'sequel.' We can also use it to handle organized data comprised of entities (variables) and relations between different entities of the data.
SQL first appeared in 1974. It is one of the most used languages for maintaining the relational database. In 1986, SQL became the standard of the American National Standards Institute (ANSI) and ISO (International Organization for Standardization) in 1987.
SQL is responsible for maintaining the relational data and the data structures present in the database. Some of the common usages are given below:
SQL refers to the Standard Query Language. Therefore, it is true that SQL is a language but does not actually support the programming language. It is a common language that doesn't have a loop, conditional statements, and logical operations. It cannot be used for anything other than data manipulation. It is a command language to perform database operations. The primary purpose of SQL is to retrieve, manipulate, update, delete, and perform complex operations like joins on the data present in the database.
The following are the four significant subsets of the SQL:
DDL stands for Data definition language. It is the subset of a database that defines the data structure of the database when the database is created. For example, we can use the DDL commands to add, remove, or modify tables. It consists of the following commands: CREATE, ALTER and DELETE database objects such as schema, tables, indexes, view, sequence, etc.
Example
Data manipulation language makes the user able to retrieve and manipulate data in a relational database. The DML commands can only perform read-only operations on data. We can perform the following operations using DDL language:
Example
Data control language allows users to control access and permission management to the database. It is the subset of a database, which decides that what part of the database should be accessed by which user at what point of time. It includes two commands, GRANT and REVOKE.
GRANT: It enables system administrators to assign privileges and roles to the specific user accounts to perform specific tasks on the database.
REVOKE: It enables system administrators to revoke privileges and roles from the user accounts so that they cannot use the previously assigned permission on the database.
Example
A table is a set of organized data in the form of rows and columns. It enables users to store and display records in the structure format. It is similar to worksheets in the spreadsheet application. Here rows refer to the tuples, representing the simple data item, and columns are the attribute of the data items present in a particular row. Columns can categorize as vertical, and Rows are horizontal.
Fields are the components to provide the structure for the table. It stores the same category of data in the same data type. A table contains a fixed number of columns but can have any number of rows known as the record. It is also called a column in the table of the database. It represents the attribute or characteristics of the entity in the record.
Example
Table: Student
Field: Stud_rollno, Stud_name, Date of Birth, Branch, etc.
A primary key is a field or the combination of fields that uniquely identify each record in the table. It is one of a special kind of unique key. If the column contains a primary key, it cannot be null or empty. A table can have duplicate columns, but it cannot have more than one primary key. It always stores unique values into a column. For example, the ROLL Number can be treated as the primary key for a student in the university or college.
We can define a primary key into a student table as follows:
To read more information, click here.
The foreign key is used to link one or more tables together. It is also known as the referencing key. A foreign key is specified as a key that is related to the primary key of another table. It means a foreign key field in one table refers to the primary key field of the other table. It identifies each row of another table uniquely that maintains the referential integrity. The primary key-foreign key relationship is a very crucial relationship as it maintains the ACID properties of the database sometimes. It also prevents actions that would destroy links between the child and parent tables.
We can define a foreign key into a table as follows:
To read more information, click here.
A unique key is a single or combination of fields that ensure all values stores in the column will be unique. It means a column cannot stores duplicate values. This key provides uniqueness for the column or set of columns. For example, the email addresses and roll numbers of student's tables should be unique. It can accept a null value but only one null value per column. It ensures the integrity of the column or group of columns to store different values into a table.
We can define a foreign key into a table as follows:
To read more information, click here.
The primary key and unique key both are essential constraints of the SQL. The main difference among them is that the primary key identifies each record in the table. In contrast, the unique key prevents duplicate entries in a column except for a NULL value. The following comparison chart explains it more clearly:
Primary Key | Unique Key |
---|---|
The primary key act as a unique identifier for each record in the table. | The unique key is also a unique identifier for records when the primary key is not present in the table. |
We cannot store NULL values in the primary key column. | We can store NULL value in the unique key column, but only one NULL is allowed. |
We cannot change or delete the primary key column values. | We can modify the unique key column values. |
To read more information, click here.
A database is an organized collection of data that is structured into tables, rows, columns, and indexes. It helps the user to find the relevant information frequently. It is an electronic system that makes data access, data manipulation, data retrieval, data storing, and data management very easy. Almost every organization uses the database for storing the data due to its easily accessible and high operational ease. The database provides perfect access to data and lets us perform required tasks.
The following are the common features of a database:
DBMS stands for Database Management System. It is a software program that primarily functions as an interface between the database and the end-user. It provides us the power such as managing the data, the database engine, and the database schema to facilitate the organization and manipulation of data using a simple query in almost no time. It is like a File Manager that manages data in a database rather than saving it in file systems. Without the database management system, it would be far more difficult for the user to access the database's data.
The following are the components of a DBMS:
The database management systems can be categorized into several types. Some of the important lists are given below:
RDBMS stands for Relational Database Management System. It is a database management system based on a relational model. It facilitates you to manipulate the data stored in the tables by using relational operators. RDBMS stores the data into the collection of tables and links those tables using the relational operators easily whenever required. Examples of relational database management systems are Microsoft Access, MySQL, SQL Server, Oracle database, etc.
Normalization is used to minimize redundancy and dependency by organizing fields and table of a database.
There are some rules of database normalization, which is commonly known as Normal From, and they are:
Using these steps, the redundancy, anomalies, inconsistency of the data in the database can be removed.
Normalization is mainly used to add, delete or modify a field that can be made in a single table. The primary use of Normalization is to remove redundancy and remove the insert, delete and update distractions. Normalization breaks the table into small partitions and then links them using different relationships to avoid the chances of redundancy.
The major disadvantages are:
The occurrence of redundant terms in the database causes the waste of space in the disk.
Due to redundant terms, inconsistency may also occur. If any change is made in the data of one table but not made in the same data of another table, then inconsistency will occur. This inconsistency will lead to the maintenance problem and effects the ACID properties as well.
An Inconsistent dependency refers to the difficulty of getting relevant data due to a missing or broken path to the data. It leads users to search the data in the wrong table, resulting in an error as an output.
Denormalization is a technique used by database administrators to optimize the efficiency of their database infrastructure. The denormalization concept is based on Normalization, which is defined as arranging a database into tables correctly for a particular purpose. This method allows us to add redundant data into a normalized database to alleviate issues with database queries that merge data from several tables into a single table. It adds redundant terms into the tables to avoid complex joins and many other complex operations.
Denormalization doesn't mean that normalization will not be done. It is an optimization strategy that takes place after the normalization process.
Operators are the special keywords or special characters reserved for performing particular operations. They are also used in SQL queries. We can primarily use these operators within the WHERE clause of SQL commands. It's a part of the command to filters data based on the specified condition. The SQL operators can be categorized into the following types:
A view is a database object that has no values. It is a virtual table that contains a subset of data within a table. It looks like an actual table containing rows and columns, but it takes less space because it is not present physically. It is operated similarly to the base table but does not contain any data of its own. Its name is always unique. A view can have data from one or more tables. If any changes occur in the underlying table, the same changes reflected in the views also.
The primary use of a view is to implement the security mechanism. It is the searchable object where we can use a query to search the view as we use for the table. It only shows the data returned by the query that was declared when the view was created.
We can create a view by using the following syntax:
An index is a disc structure associated with a table or view that speeds up row retrieval. It reduces the cost of the query because the query's high cost will lead to a fall in its performance. It is used to increase the performance and allow faster retrieval of records from the table. Indexing reduces the number of data pages we need to visit to find a particular data page. It also has a unique value meaning that the index cannot be duplicated. An index creates an entry for each value which makes it faster to retrieve data.
For example: Suppose we have a book which carries the details of the countries. If you want to find out information about India, why will you go through every page of that book? You could directly go to the index. Then from the index, you can go to that particular page where all the information about India is given.
SQL indexes are nothing more than a technique of minimizing the query's cost. The higher the query's cost, the worse the query's performance. The following are the different types of Indexes supported in SQL:
UNIQUE INDEX is used to enforce the uniqueness of values in single or multiple columns. We can create more than one unique index in a single table. For creating a unique index, the user has to check the data in the column because the unique indexes are used when any column of the table has unique values. This indexing does not allow the field to have duplicate values if the column is unique indexed. A unique index can be applied automatically when a primary key is defined.
We can create it by using the following syntax:
Example
Suppose we want to make a Phone column as a unique index. We can do this like below:
To read more information, click here.
A clustered index is actually a table where the data for the rows are stored. It determines the order of the table data based on the key values that can sort in only one direction. Each table can have only one clustered index. It is the only index, which has been automatically created when the primary key is generated. If many data modifications needed to be done in the table, then clustered indexes are preferred.
To read more information, click here.
The indexes other than PRIMARY indexes (clustered indexes) are called non-clustered indexes. We know that clustered indexes are created automatically when primary keys are generated, and non-clustered indexes are created when multiple joins conditions and various filters are used in the query. The non-clustered index and table data are both stored in different places. It cannot be able to alter the physical order of the table and maintains the logical order of data.
The purpose of creating a non-clustered index is for searching the data. Its best example is a book where the content is written in one place, and the index is at a different place. We can create 0 to 249 non-clustered indexes in each table. The non-clustered indexing improves the performance of the queries which use keys without assigning the primary key.
The following comparison chart explains their main differences:
SQL | MySQL | SQL Server |
---|---|---|
SQL or Structured Query Language is useful for managing our relational databases. It is used to query and operate the database. | MySQL is the popular database management system used for managing the relational database. It is a fast, scalable, and easy-to-use database. | SQL Server is an RDBMS database system mainly developed for the Windows system to store, retrieve, and access data requested by the developer. |
SQL first appeared in 1974. | MySQL first appeared on May 23, 1995. | SQL Server first appeared on April 24, 1989. |
SQL was developed by IBM Corporation. | MySQL was developed by Oracle Corporation. | SQL Server was developed by Microsoft Company. |
SQL is a query language for managing databases. | MySQL is database software that uses SQL language to conduct with the database. | SQL Server is also a software that uses SQL language to conduct with the database. |
SQL has no variables. | MySQL can use variables constraints and data types. | SQL Server can use variables constraints and data types. |
SQL is a programming language, so that it does not get any updates. Its commands are always fixed and remain the same. | MySQL is software, so it gets frequent updation. | SQL Server is also software, so it gets frequent updation. |
The following comparison chart explains their main differences:
SQL | PL/SQL |
---|---|
SQL is a database structured query language used to communicate with relational databases. It was developed by IBM Corporations and first appeared in 1974. | PL/SQL or Procedural Language/Structured Query Language is a dialect of SQL used to enhance the capabilities of SQL. Oracle Corporation developed it in the early 90's. It uses SQL as its database language. |
SQL is a declarative and data-oriented language. | PL/SQL is a procedural and application-oriented language. |
SQL has no variables. | PL/SQL can use variables constraints and data types. |
SQL can execute only a single query at a time. | PL/SQL can execute a whole block of code at once. |
SQL query can be embedded in PL/SQL. | PL/SQL cannot be embedded in SQL as SQL does not support any programming language and keywords. |
SQL can directly interact with the database server. | PL/SQL cannot directly interact with the database server. |
SQL is like the source of data that we need to display. | PL/SQL provides a platform where SQL data will be shown. |
Yes. We can use the alias method in the ORDER BY instead of the WHERE clause for sorting a column.
Indexing is a method to get the requested data very fast. There are mainly two types of indexes in SQL, clustered index and non-clustered index. The differences between these two indexes are very important from an SQL performance perspective. The following comparison chart explains their main differences:
Clustered Index | Non-Clustered Index |
---|---|
A clustered index is a table or view where the data for the rows are stored. In a relational database, if the table column contains a primary key, MySQL automatically creates a clustered index named PRIMARY. | The indexes other than PRIMARY indexes (clustered indexes) are called non-clustered indexes. It has a structure separate from the data row. The non-clustered indexes are also known as secondary indexes. |
Clustered indexes store the data information and the data itself. | Non-clustered indexes stores only the information, and then it will refer you to the data stored in clustered data. |
There can only be one clustered index per table. | There can be one or more non-clustered indexes in a table. |
A clustered index determines how data is stored physically in the table. Therefore, reading from a clustered index is faster. | It creates a logical ordering of data rows and uses pointers for accessing the physical data files. Therefore, reading from a clustered index is slower. |
A clustered index always contains an index id of 0. | A non-clustered index always contains an index id>0. |
To read more information, click here.
There is a built-in function in SQL called GetDate(), which is used to return the current timestamp.
SQL joins are used to retrieve data from multiple tables into a meaningful result set. It is performed whenever you need to fetch records from two or more tables. They are used with SELECT statement and join conditions.
The following are the most commonly used joins in SQL:
Joins are used to merge two tables or retrieve data from tables. It depends on the relationship between tables. According to the ANSI standard, the following are the different types of joins used in SQL:
To read more information, click here.
Inner join returns only those records from the tables that match the specified condition and hides other rows and columns. In simple words, it fetches rows when there is at least one match of rows between the tables is found. INNER JOIN keyword joins the matching records from two tables. It is assumed as a default join, so it is optional to use the INNER keyword with the query.
The below visual representation explain this join more clearly:
The following syntax illustrates the INNER JOIN:
To read more information, click here.
The Right join is used to retrieve all rows from the right-hand table and only those rows from the other table that fulfilled the join condition. It returns all the rows from the right-hand side table even though there are no matches in the left-hand side table. If it finds unmatched records from the left side table, it returns a Null value. This join is also known as Right Outer Join.
The below visual representation explain this join more clearly:
The following syntax illustrates the RIGHT JOIN:
To read more information, click here.
The Left Join is used to fetch all rows from the left-hand table and common records between the specified tables. It returns all the rows from the left-hand side table even though there are no matches on the right-hand side table. If it will not find any matching record from the right side table, then it returns null. This join can also be called a Left Outer Join.
The following visual representation explains it more clearly:
The following syntax illustrates the RIGHT JOIN:
To read more information, click here.
The Full Join results from a combination of both left and right join that contains all the records from both tables. It fetches rows when there are matching rows in any one of the tables. This means it returns all the rows from the left-hand side table and all the rows from the right-hand side tables. If a match is not found, it puts NULL value. It is also known as FULL OUTER JOIN.
The following visual representation explains it more clearly:
The following syntax illustrates the FULL JOIN:
To read more information, click here.
A trigger is a set of SQL statements that reside in a system catalog. It is a special type of stored procedure that is invoked automatically in response to an event. It allows us to execute a batch of code when an insert, update or delete command is run against a specific table because the trigger is the set of activated actions whenever DML commands are given to the system.
SQL triggers have two main components one is action, and another is an event. When certain actions are taken, an event occurs as a result of those actions.
We use the CREATE TRIGGER statement for creating a trigger in SQL. Here is the syntax:
To read more information, click here.
A SELF JOIN is used to join a table with itself. This join can be performed using table aliases, which allow us to avoid repeating the same table name in a single sentence. It will throw an error if we use the same table name more than once in a single query without using table aliases.
A SELF JOIN is required when we want to combine data with other data in the same table itself. It is often very useful to convert a hierarchical structure to a flat structure.
The following syntax illustrates the SELF JOIN:
Example
Suppose we have a table 'Student' having the following data:
If we want to get retrieve the student_id and name from the table where student_id is equal, and course_id is not equal, it can be done by using the self-join:
Here is the result:
To read more information, click here.
We use the set operators to merge data from one or more tables of the same kind. Although the set operators are like SQL joins, there is a significant distinction. SQL joins combine columns from separate tables, whereas SQL set operators combine rows from different queries. SQL queries that contain set operations are called compound queries. The set operators in SQL are categories into four different types:
A. UNION: It combines two or more results from multiple SELECT queries into a single result set. It has a default feature to remove the duplicate rows from the tables. The following syntax illustrates the Union operator:
B. UNION ALL: This operator is similar to the Union operator, but it does not remove the duplicate rows from the output of the SELECT statements. The following syntax illustrates the UNION ALL operator:
C. INTERSECT: This operator returns the common records from two or more SELECT statements. It always retrieves unique records and arranges them in ascending order by default. Here, the number of columns and data types should be the same. The following syntax illustrates the INTERSECT operator:
D. MINUS: This operator returns the records from the first query, which is not found in the second query. It does not return duplicate values. The following syntax illustrates the MINUS operator:
To read more information, click here.
The following comparison chart explains their main differences:
BETWEEN Operator | IN Operator |
---|---|
This operator is used to selects the range of data between two values. The values can be numbers, text, and dates as well. | It is a logical operator to determine whether or not a specific value exists within a set of values. This operator reduces the use of multiple OR conditions with the query. |
It returns records whose column value lies in between the defined range. | It compares the specified column's value and returns the records when the match exists in the set of values. |
The following syntax illustrates this operator: SELECT * FROM table_name WHERE column_name BETWEEN 'value1' AND 'value2'; |
The following syntax illustrates this operator: SELECT * FROM table_name WHERE column_name IN ('value1','value 2'); |
The constraint is used to specify the rule and regulations that allows or restricts what values/data will be stored in the table. It ensures data accuracy and integrity inside the table. It enforces us to store valid data and prevents us from storing irrelevant data. If any interruption occurs between the constraint and data action, the action is failed. Some of the most commonly used constraints are NOT NULL, PRIMARY KEY, FOREIGN KEY, AUTO_INCREMENT, UNIQUE KEY, etc.
The following syntax illustrates us to create a constraint for a table:
SQL categories the constraints into two levels:
Column Level Constraints: These constraints are only applied to a single column and limit the type of data that can be stored in that column.
Table Level Constraints: These constraints are applied to the entire table and limit the type of data that can be entered.
To read more information, click here.
We can write the following query to get the student details whose name starts with A:
Here is the demo example where we have a table named student that contains two names starting with the 'A' character.
The following query is the simplest way to get the third maximum salary of an employee:
Here is the demo example that shows how to get the third maximum salary of an employee.
The following are the alternative way to get the third-highest salary of an employee:
A. Using LIMIT Keyword
B. Using Subquery
C. Using TOP Keyword
The main difference between them is that the delete statement deletes data without resetting a table's identity, whereas the truncate command resets a particular table's identity. The following comparison chart explains it more clearly:
No. | DELETE | TRUNCATE |
---|---|---|
1) | The delete statement removes single or multiple rows from an existing table depending on the specified condition. | The truncate command deletes the whole contents of an existing table without the table itself. It preserves the table structure or schema. |
2) | DELETE is a DML command. | TRUNCATE is a DML command. |
3) | We can use the WHERE clause in the DELETE command. | We cannot use the WHERE clause with TRUNCATE. |
4) | DELETE statement is used to delete a row from a table. | TRUNCATE statement is used to remove all the rows from a table. |
5) | DELETE is slower because it maintained the log. | TRUNCATE statement is faster than DELETE statement as it deletes entire data at a time without maintaining transaction logs. |
6) | You can roll back data after using the DELETE statement. | It is not possible to roll back after using the TRUNCATE statement. |
7) | DELETE query takes more space. | TRUNCATE query occupies less space. |
To read more information, click here.
The ACID properties are meant for the transaction that goes through a different group of tasks. A transaction is a single logical order of data. It provides properties to maintain consistency before and after the transaction in a database. It also ensures that the data transactions are processed reliably in a database system.
The ACID property is an acronym for Atomicity, Consistency, Isolation, and Durability.
Atomicity: It ensures that all statements or operations within the transaction unit must be executed successfully. If one part of the transaction fails, the entire transaction fails, and the database state is left unchanged. Its main features are COMMIT, ROLLBACK, and AUTO-COMMIT.
Consistency: This property ensures that the data must meet all validation rules. In simple words, we can say that the database changes state only when a transaction will be committed successfully. It also protects data from crashes.
Isolation: This property guarantees that the concurrent property of execution in the transaction unit must be operated independently. It also ensures that statements are transparent to each other. The main goal of providing isolation is to control concurrency in a database.
Durability: This property guarantees that once a transaction has been committed, it persists permanently even if the system crashes, power loss, or failed.
To read more information, click here.
No. The NULL value is not the same as zero or a blank space. The following points explain their main differences:
SQL functions are simple code snippets that are frequently used and re-used in database systems for data processing and manipulation. Functions are the measured values. It always performs a specific task. The following rules should be remembered while creating functions:
SQL categories the functions into two types:
SQL functions are used for the following purposes:
Case manipulation functions are part of the character functions. It converts the data from the state in which it is already stored in the table to upper, lower, or mixed case. The conversion performed by this function can be used to format the output. We can use it in almost every part of the SQL statement. Case manipulation functions are mostly used when you need to search for data, and you don't have any idea that the data you are looking for is in lower case or upper case.
There are three case manipulation functions in SQL:
LOWER: This function is used to converts a given character into lowercase. The following example will return the 'STEPHEN' as 'stephen':
UPPER: This function is used to converts a given character into uppercase. The following example will return the 'stephen' as 'STEPHEN':
INITCAP: This function is used to converts given character values to uppercase for the initials of each word. It means every first letter of the word is converted into uppercase, and the rest is in lower case. The following example will return the 'hello stephen' as 'Hello Stephen':
Character-manipulation functions are used to change, extract, and alter the character string. When one or more characters and words are passed into the function, the function will perform its operation on those input strings and return the result.
The following are the character manipulation functions in SQL:
A) CONCAT: This function is used to join two or more values together. It always appends the second string into the end of the first string. For example:
Input: SELECT CONCAT ('Information-', 'technology') FROM DUAL;
Output: Information-technology
B) SUBSTR: It is used to return the portion of the string from a specified start point to an endpoint. For example:
Input: SELECT SUBSTR ('Database Management System', 9, 11) FROM DUAL;
Output: Management
C) LENGTH: This function returns the string's length in numerical value, including the blank spaces. For example:
Input: SELECT LENGTH ('Hello Javatpoint') FROM DUAL;
Output: 16
D) INSTR: This function finds the exact numeric position of a specified character or word in a given string. For example:
Input: SELECT INSTR ('Hello Javatpoint', 'Javatpoint');
Output: 7
E) LPAD: It returns the padding of the left-side character value for right-justified value. For example:
Input: SELECT LPAD ('200', 6,'*');
Output: ***200
F) RPAD: It returns the padding of the right-side character value for left-justified value. For example:
Input: SELECT RPAD ('200', 6,'*');
Output: 200***
G) TRIM: This function is used to remove all the defined characters from the beginning, end, or both. It also trimmed extra spaces. For example:
Input: SELECT TRIM ('A' FROM 'ABCDCBA');
Output: BCDCB
H) REPLACE: This function is used to replace all occurrences of a word or portion of the string (substring) with the other specified string value. For example:
Input: SELECT REPLACE ( 'It is the best coffee at the famous coffee shop.', 'coffee', 'tea');
Output: It is the best tea at the famous tea shop.
The NVL() function is used to convert the NULL value to the other value. The function returns the value of the second parameter if the first parameter is NULL. If the first parameter is anything other than NULL, it is left unchanged. This function is used in Oracle, not in SQL and MySQL. Instead of NVL() function, MySQL have IFNULL() and SQL Server have ISNULL() function.
The MOD function returns the remainder in a division operation.
The COALESCE() function evaluates the arguments in sequence and returns the first NON-NULL value in a specified number of expressions. If it evaluates arguments as NULL or not found any NON-NULL value, it returns the NULL result.
The syntax of COALESCE function is given below:
Example:
This statement will return the following output:
The DISTINCT keyword is used to ensure that the fetched value always has unique values. It does not allow to have duplicate values. The DISTINCT keyword is used with the SELECT statement and retrieves different values from the table's column. We can use it with the help of the following syntax:
Suppose we have a table 'customer' containing eight records in which the name column has some duplicate values.
If we want to get the name column without any duplicate values, the DISTINCT keyword is required. Executing the below command will return a name column with unique values.
The ORDER BY clause is used to sort the table data either in ascending or descending order. By default, it will sort the table in ascending order. If we want to change its default behavior, we need to use the DESC keyword after the column name in the ORDER BY clause.
The syntax to do this is given below:
We have taken a customer table in the previous example. Now, we will demonstrate the ORDER BY clause on them as well.
In the below output, we can see that the first query will sort the table data in ascending order based on the name column. However, if we run the second query by specifying the DESC keyword, the table's order is changed in descending order.
Answer: No. The above query does not return the output because we cannot use the WHERE clause to restrict the groups. We need to use the HAVING clause instead of the WHERE clause to get the correct output.
The main difference is that the WHERE clause is used to filter records before any groupings are established, whereas the HAVING clause is used to filter values from a group. The below comparison chart explains the most common differences:
WHERE | HAVING |
---|---|
This clause is implemented in row operations. | This clause is implemented in column operations. |
It does not allow to work with aggregate functions. | It can work with aggregate functions. |
This clause can be used with the SELECT, UPDATE, and DELETE statements. | This clause can only be used with the SELECT statement. |
To know more differences, click here.
The aggregate function is used to determine and calculate several values in a table and return the result as a single number. For example, the average of all values, the sum of all values, and the maximum and minimum value among particular groupings of values.
The following syntax illustrates how to use aggregate functions:
SQL provides seven (7) aggregate functions, which are given below:
SQL injection is a type of vulnerability in website and web app code that allows attackers to control back-end operations and access, retrieve, and destroy sensitive data from databases. In this technique, malicious SQL statements are inserted into a database entry field, and once they are performed, the database becomes vulnerable to an attacker. This technique is commonly used to access sensitive data and perform administrative activities on databases by exploiting data-driven applications. It is also known as SQLi attack.
Some common examples of SQL injection are:
The RANK function determines the rank for each row within your ordered partition in the result set. If the two rows are assigned the same rank, then the next number in the ranking will be its previous rank plus a number of duplicate numbers. For example, if we have three records at rank 4, the next rank listed would be ranked 7.
The DENSE_RANK function assigns a unique rank for each row within a partition as per the specified column value without any gaps. It always specifies ranking in consecutive order. If the two rows are assigned the same rank, this function will assign it with the same rank, and the next rank being the next sequential number. For example, if we have 3 records at rank 4, the next rank listed would be ranked 5.
Yes. We can implicitly insert a row for the identity column. Here is an example of doing this:
Comments are explanations or annotations in SQL queries that are readable by programmers. It's used to make SQL statements easier to understand for humans. During the parsing of SQL code, it will be ignored. Comments can be written on a single line or across several lines.
This section provides multiple-choice questions and answers based on advanced query optimization.
1) What type of join do you need when you want to include rows with values that don't match?
Answer: b
Explanation: Outer Join returns all rows that match the specified condition, including unmatched rows from one or both tables. Hence, option (B) is the right answer because the outer join is the only join that can display unmatched records.
2) Which of the following option matched a CASE SQL statement?
Answer: a
Explanation: The CASE expression is a control flow function that evaluates a set of conditions and displays the output when the first condition is met. It is primarily used to handle conditional statements, same as IF-THEN-ELSE statements in other programming languages. Hence, option (A) is the right answer.
3) Which of the following is an illegal data type in SQL?
Answer: d
Explanation: NUMBER data type is used for defining exact or approximate numeric values. CLOB stands for Character Large Object used for storing a large amount of textual data. BLOB stands for Binary Large Object that acts as a reference or pointer to an object such as a file, image, video, etc. LINT is a SQL dialect linter. It highlights mistakes, explains what's wrong with them, why they might be wrong, and what you can do as developers to fix them. Hence option (D) is the right answer.
4) The view is updated immediately if the actual relations used in the view definition change. These views are referred to as _________.
Answer: c
Explanation: A materialized view is a table stored on the disk containing the data from the result set of a query. It helps to keep the database up-to-date. Views are called Materialized views when the actual relations used in the view definition change, and the view is updated immediately.
5) The part of SQL that deals with the SQL support constructs are called _______.
Answer: d
Explanation: Persistent Storage Module (SQL/PSM) is a feature that allows users to extend the basic SQL functionality with their own additions.
6) Which of the following is true regarding a correlated subquery?
Answer: a
Explanation: Correlated subqueries are used for row-by-row processing. It referenced a column in the outer query and evaluated once for each row processed by the outer query (parent statement) such as SELECT, UPDATE, or DELETE statement. On the other hand, uncorrelated subqueries evaluate the subquery first and then determine the processing of the outer query.
7) Whenever a database is modified, the system executes a statement called _________.
Answer: b
Explanation: A trigger is a set of SQL queries that reside in a system catalog. It is a special type of stored procedure that is invoked automatically in response to an event. Hence, option (B) is correct because the trigger is a statement that the system executes whenever a database is modified.
8) A transaction starts when
Answer: d
Explanation: A transaction has a statement to begin and end both. It starts when one of the following events takes place CREATE, COMMIT, ROLLBACK, etc. Hence option (D) is correct.
9) Which of the below sequential statements cannot be used in a function?
Answer: b
Explanation: A function can use any type of sequential statements, such as an IF, CASE, LOOP, NEXT, EXIT, or NULL statement. However, it has one exception: it does not allow to work with WAIT statement because it cannot be used inside a function. The WAIT statement is used to schedule system work.
10) In the data type TIME(p), what does p stands for?
Answer: c
Explanation: The SQL TIME data type represents a day's time using a 24-hour clock. The p indicates the number of digits for the fractional part of the seconds. Its value ranges from 0 to 7. If we do not specify the p, it will be 7 by default. Hence option (C) is the correct answer.
11) Which of the following is a privilege in SQL standard?
Answer: d
Explanation: A privilege allows users to perform a set of activities on a particular database object. Privileges are divided into two categories:
12) Which of the following indicates another name for referential integrity constraints?
Answer: b
Explanation: Referential integrity specify a relation between two tables. Each table must have a primary key. It is also called subset dependencies because the set of foreign key values in table1 of table2 must be a subset of the set of primary key values in table2.
13) Triggers are stored blocks of code that have to be called in order to operate.
Answer: b
Explanation: Option (B) is correct because the trigger is a set of SQL statements that resides in system memory with unique names and is executed automatically when a database server event occurs.
14) Outer join is the same as equi-join, except one of the duplicate columns in the result table is removed.
Answer: b
Explanation: An equijoin is a join in which the equal comparison operator is used to match the keys of both tables. In contrast, outer join is a join where rows in one table that do not have a matching row in another table are selected with NULL values for the unknown columns.
15) A transaction is a collection of closely related update commands that must all be completed, or none at all, for the database to be valid.
Answer: a
Explanation: A transaction is a group of statements to perform single or multiple tasks in a database. Each transaction must happen two things in SQL: