Comp Reviewer
Comp Reviewer
Clauses are a
part of the SQL statement.
QUERY 3. EXPRESSIONS – represent a formula typically written in a
- a request for data or information from a database table or query format. It combines one or more values, operators,
a combination table. and SQL functions that evaluate a specific value. Moreover,
- a request for information from a database management SQL expressions are broadly divided into three types,
system (DBMS), which is the software program that namely, Boolean, numeric, and date.
maintains data. 4. PREDICATES – refer to keywords that reveal a relationship
- Users can make a query to retrieve data or change between two expressions and result in a true or false
information in a database, such as adding or removing value. It is just another term for an expression that is used
data. to determine an unknown or TRUE/FALSE condition.
5. QUERIES – SQL queries refer to statements used to request
STRUCTURE QUERY LANGUAGE or retrieve data from a database. For example, let’s say you
want to retrieve the first name and customer number of all
- the standard query format used by many database customers whose last name is ‘Lobo’.
management systems (DBMS).
- Is a language used to communicate with the database. SQL COMMAND
- SQL statements are used to perform various operations or
tasks such updating or retrieving data from a database. 1. DATA DEFINITION LANGUAGE (DDL) Commands – It
- is to store, retrieve, manage and manipulate data within a defines the database schema and is used to create modify
database management system. the structure database objects in the database by creating,
altering, and dropping tables and views.
2. DATA MANIPULATION LANGUAGE (DML) commands – It
is used to perform data maintenance, such as inserting,
updating, modifying, and querying in the database.
3. DATA CONTROL LANGUAGE (DCL) COMMANDS – It is
used by the database administrator to protect the
database corruption and security by controlling the rights
and permission such as to grant or to revoke privileges for
accessing the database.
DATABASE SECURITY
MALWARE
RANSOMWARE
TROJANS MALWARE