Concept
<a href="http://www.php.cn/code/8708.html" target="_blank">View</a>
is a virtual table, for users who use view , basically the same as using a normal table. The view does not exist in the database, and the data in the view is dynamically generated.
Advantages of views over ordinary tables:
Simplicity: When using views, you do not need to care about the corresponding structural conditions of subsequent tables. For users, views are filtered results. set.
Security: Users can only access the result sets for which they are allowed queries.
Data independence: Once the view structure is determined, changes to the actual table have no impact on view users.
View operations
View operations are divided into Create view
, Modify view
, <a href="http://www.php.cn/php/php-tp-remove.html" target="_blank">Delete </a>View
, View view definition
.
Create view, modify view
#创建视图 create [or replace] [algorithm={undefined|merge|temptable}] view view_name[(column_list)] as select_statement [with[cascaded|local] check option] # 修改视图 alter [algorithm={undefined|merge|temptable}] view view_name[(column_list)] as select_statement [with[cascaded|local] check option]
Example:
create view view_test as select t1.sid,t1.username,t2.department from test1 t1 left join test2 t2 on t1.sid=t2.sid;
Create view
Note:
The from keyword cannot contain a subquery;
The view that cannot be updated: contains aggregate function/group/distinct /having/union, constant view, select contains subquery, jion, from a view that cannot be updated, where subquery refers to the table in the from clause.
with[cascaded|local] check option Absolutely allows updating data so that the record no longer meets the view conditions. Among them,
local-only the conditions of this view can be updated
,cascaded-the conditions of all views for this view must be met before
can be updated. The default is cascaded.
View view data
Same as ordinary table
select * from view_test;
View View data
Delete view
#删除视图 drop view [if exists] view_name [,view_name2]...[restrict|cascade] #举例 drop view view_test;
View view status
Starting from MySQL5.1, when using the show tables command Not only the table names but also the view names are displayed.
【Related recommendations】
1. Free mysql online video tutorial
2. MySQL latest manual tutorial
3. Those things about database design
The above is the detailed content of Introduce the concept and operation of views in mysql. For more information, please follow other related articles on the PHP Chinese website!

MySQLdiffersfromotherSQLdialectsinsyntaxforLIMIT,auto-increment,stringcomparison,subqueries,andperformanceanalysis.1)MySQLusesLIMIT,whileSQLServerusesTOPandOracleusesROWNUM.2)MySQL'sAUTO_INCREMENTcontrastswithPostgreSQL'sSERIALandOracle'ssequenceandt

MySQL partitioning improves performance and simplifies maintenance. 1) Divide large tables into small pieces by specific criteria (such as date ranges), 2) physically divide data into independent files, 3) MySQL can focus on related partitions when querying, 4) Query optimizer can skip unrelated partitions, 5) Choosing the right partition strategy and maintaining it regularly is key.

How to grant and revoke permissions in MySQL? 1. Use the GRANT statement to grant permissions, such as GRANTALLPRIVILEGESONdatabase_name.TO'username'@'host'; 2. Use the REVOKE statement to revoke permissions, such as REVOKEALLPRIVILEGESONdatabase_name.FROM'username'@'host' to ensure timely communication of permission changes.

InnoDB is suitable for applications that require transaction support and high concurrency, while MyISAM is suitable for applications that require more reads and less writes. 1.InnoDB supports transaction and bank-level locks, suitable for e-commerce and banking systems. 2.MyISAM provides fast read and indexing, suitable for blogging and content management systems.

There are four main JOIN types in MySQL: INNERJOIN, LEFTJOIN, RIGHTJOIN and FULLOUTERJOIN. 1.INNERJOIN returns all rows in the two tables that meet the JOIN conditions. 2.LEFTJOIN returns all rows in the left table, even if there are no matching rows in the right table. 3. RIGHTJOIN is contrary to LEFTJOIN and returns all rows in the right table. 4.FULLOUTERJOIN returns all rows in the two tables that meet or do not meet JOIN conditions.

MySQLoffersvariousstorageengines,eachsuitedfordifferentusecases:1)InnoDBisidealforapplicationsneedingACIDcomplianceandhighconcurrency,supportingtransactionsandforeignkeys.2)MyISAMisbestforread-heavyworkloads,lackingtransactionsupport.3)Memoryengineis

Common security vulnerabilities in MySQL include SQL injection, weak passwords, improper permission configuration, and unupdated software. 1. SQL injection can be prevented by using preprocessing statements. 2. Weak passwords can be avoided by forcibly using strong password strategies. 3. Improper permission configuration can be resolved through regular review and adjustment of user permissions. 4. Unupdated software can be patched by regularly checking and updating the MySQL version.

Identifying slow queries in MySQL can be achieved by enabling slow query logs and setting thresholds. 1. Enable slow query logs and set thresholds. 2. View and analyze slow query log files, and use tools such as mysqldumpslow or pt-query-digest for in-depth analysis. 3. Optimizing slow queries can be achieved through index optimization, query rewriting and avoiding the use of SELECT*.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Zend Studio 13.0.1
Powerful PHP integrated development environment

SublimeText3 Chinese version
Chinese version, very easy to use

Dreamweaver Mac version
Visual web development tools
