search
HomeDatabaseMysql TutorialA large collection of MySQL sql basic statements

I am accustomed to using SQL Sever to directly design the database every time, but do not pay enough attention to SQL statements. I took the opportunity of this reconstruction of the computer room cooperation version to use SQL statements to design the database and at the same time Let’s sort out the basic usage of SQL statements.

【Classification】

There are 9 types of SQL statements, which can be roughly divided into 4 types according to their functions:

1. Query statement: select ----The most commonly used statement in the database

2. Data definition: create, drop, alter----for Operations on databases, data tables, and fields in tables

3. Data manipulation: insert, update, delete----the legendary "add, delete, modify, query", for specific Data operations

4. Data control: grant, revoke----definition and deletion of permissions

[Statement summary]

1. Create a database

##

create database RechargeSystem
on primary    --主文件组
(
	/*数据文件的具体描述*/
	name='RechargeSystem_data',  --主数据文件的逻辑名称
	filename='G:\RechargeSystem\RechargeSystem_data.mdf',  --主数据文件的物理名称
	size=5mb,       --初始大小
	maxsize=100mb,  --增长最大值
	filegrowth=15%   --主数据文件增长率
)
log on
(
	/*日志文件的具体描述*/
	name='RechargeSystem_log',
	filename='G:\RechargeSystem\RechargeSystem_log.ldf',
	size=2mb,
	filegrowth=1mb
)

If you have learned the operating system, you will not be very familiar with these definition statements. Strangely enough, a database group file is also a kind of file and needs to have a logical name (i.e. file name), physical name (actual storage address on the disk), file size, etc.; the log file records all logical operations in the database, with details such as advantages and disadvantages. For the content, see Baidu Encyclopedia: Log file


2. Basic table operations

--------------------------------------------------------------------------------------------------------------------------------------------
       create table <基本表名>   ---建立表格
               (<列名 类型 not null>,
                 primary key(列名,列名),--主键约束
                 foreign key (<列名>) references tableName(<列名>),--外键约束);
--------------------------------------------------------------------------------------------------------------------------------------------
      alter table <表名> add <列名><数据类型>  --添加列

You can set the primary and foreign keys of the established table:
##

  alter table <表名> add primary key(<列名>,<列名>)
      alter table<表名> add foreign key(<列名>) references tableName(<列名>)

Delete a column: alter table drop [cascade|restrict] --restrict will Views and constraints are also sectored


---------------------- -------------------------------------------------- -------------------------------------------------- ------------------

## drop table

[cascade|restrict] --Delete table, with constraints Restrict

must be added to the condition

3. Query statement:

Regular The query statement is: select * from datatable


It should be noted that nested and connected queries are queried from multiple tables. This combination relationship is commonly used in M:N relationships. Find the corresponding relationship.

 select TB1.column1,TB1.column2
                from TB1
                where TB1.column1 in(select column1
                                                         from TB2
                                                        where TB2.column2="特定值");


This relationship is not recommended for users with confusing logic, as it is particularly likely to cause search failure.

---------------------------------------- -------------------------------------------------- -------------------------------------------------- --

In addition, the SQL query statement also provides basic aggregate functions for easy query use:

count(*) --- --------------------Calculate the number of tuples, that is, how many columns there are in total

count()----------------Calculation of the number of values ​​in a column

sum()-- ------------------The sum of a column of values ​​(numeric type)

avg ()-- -------------Average (must be numeric type)

max()-------- ---------Maximum value

## min()------------------ ----Minimum value

#--------------------------------------------- -------------------------------------------------- --------------------------------------------------

Complete semantic structure:

                                                                                                                                                                 ’’’''‐‐' '' #''''''''‐'‐'‐'‐‐‐‐---- where

## group by ----------------------- ---------Grouping based on a certain field

## Having -------------- ------Information that does not meet the group conditions is filtered out

## Order by ---------- --------Asc ascending order, desc descending order

----------------------- -------------------------------------------------- -------------------------------------------------- -------------------

## Special query requirements:

1. Comparison Operations: ,>=,!=

## 2. Matching operation: %---matches characters consisting of zero or more characters , "_" single character matches

3. Null value is Null

4. Aggregated resource comparison: in, some, any, all

5. Whether the set is non-empty: exits --- If it is not empty, it is true, otherwise it is false

6. Whether there are duplicates in the set Tuple: unique--------repeat to true, otherwise false

-------------------------- -------------------------------------------------- -------------------------------------------------- -----------------------

4. Data operation statements

Insert: insert into

(, ...) values('value', 'value')

Delete: delete from

where condition

Modify: update

set ##5. Embedded SQL usage technology, commonly used execution views, stored procedures, etc., add exec to execute

[Summary]

Knowledge is always like this , you will gain different results every time you study, especially after using it, you will try to compare the differences between different methods. I look forward to the next comparative study of database views, stored procedures and security settings.

The above is the content of a large collection of MySQL sql basic statements. For more related content, please pay attention to the PHP Chinese website (www.php.cn)!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What Are the Limitations of Using Views in MySQL?What Are the Limitations of Using Views in MySQL?May 14, 2025 am 12:10 AM

MySQLviewshavelimitations:1)Theydon'tsupportallSQLoperations,restrictingdatamanipulationthroughviewswithjoinsorsubqueries.2)Theycanimpactperformance,especiallywithcomplexqueriesorlargedatasets.3)Viewsdon'tstoredata,potentiallyleadingtooutdatedinforma

Securing Your MySQL Database: Adding Users and Granting PrivilegesSecuring Your MySQL Database: Adding Users and Granting PrivilegesMay 14, 2025 am 12:09 AM

ProperusermanagementinMySQLiscrucialforenhancingsecurityandensuringefficientdatabaseoperation.1)UseCREATEUSERtoaddusers,specifyingconnectionsourcewith@'localhost'or@'%'.2)GrantspecificprivilegeswithGRANT,usingleastprivilegeprincipletominimizerisks.3)

What Factors Influence the Number of Triggers I Can Use in MySQL?What Factors Influence the Number of Triggers I Can Use in MySQL?May 14, 2025 am 12:08 AM

MySQLdoesn'timposeahardlimitontriggers,butpracticalfactorsdeterminetheireffectiveuse:1)Serverconfigurationimpactstriggermanagement;2)Complextriggersincreasesystemload;3)Largertablesslowtriggerperformance;4)Highconcurrencycancausetriggercontention;5)M

MySQL: Is it safe to store BLOB?MySQL: Is it safe to store BLOB?May 14, 2025 am 12:07 AM

Yes,it'ssafetostoreBLOBdatainMySQL,butconsiderthesefactors:1)StorageSpace:BLOBscanconsumesignificantspace,potentiallyincreasingcostsandslowingperformance.2)Performance:LargerrowsizesduetoBLOBsmayslowdownqueries.3)BackupandRecovery:Theseprocessescanbe

MySQL: Adding a user through a PHP web interfaceMySQL: Adding a user through a PHP web interfaceMay 14, 2025 am 12:04 AM

Adding MySQL users through the PHP web interface can use MySQLi extensions. The steps are as follows: 1. Connect to the MySQL database and use the MySQLi extension. 2. Create a user, use the CREATEUSER statement, and use the PASSWORD() function to encrypt the password. 3. Prevent SQL injection and use the mysqli_real_escape_string() function to process user input. 4. Assign permissions to new users and use the GRANT statement.

MySQL: BLOB and other no-sql storage, what are the differences?MySQL: BLOB and other no-sql storage, what are the differences?May 13, 2025 am 12:14 AM

MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

MySQL Add User: Syntax, Options, and Security Best PracticesMySQL Add User: Syntax, Options, and Security Best PracticesMay 13, 2025 am 12:12 AM

ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

MySQL: How to avoid String Data Types common mistakes?MySQL: How to avoid String Data Types common mistakes?May 13, 2025 am 12:09 AM

ToavoidcommonmistakeswithstringdatatypesinMySQL,understandstringtypenuances,choosetherighttype,andmanageencodingandcollationsettingseffectively.1)UseCHARforfixed-lengthstrings,VARCHARforvariable-length,andTEXT/BLOBforlargerdata.2)Setcorrectcharacters

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool