This document discusses searching and filtering data in a database. It describes opening PHP files for displaying department and student data, renaming them to include search, and adding code to search specific fields. Code examples are provided to search a department code field and student first name field to return matching recordsets filtered by the search values. The document also covers adding multiple search conditions to further refine results.
The document describes the normalization of database tables from first normal form to fourth normal form. It shows sample data being structured into tables for products, orders, order details, and customers. The tables are normalized through each form by removing anomalies and non-key attributes to isolate dependencies and establish relationships through primary and foreign keys. By fourth normal form, the tables avoid update, insertion, and deletion anomalies through full normalization.
The document discusses using forms to add additional information to tables in a database. It describes creating forms to add departments and students to the tbl_department and tbl_student tables respectively. It includes designing the forms with various input fields, populating dropdown lists dynamically from the database, and submitting the form data to insert new records into the tables. The forms are then tested by viewing the submitted data in the browser and checking that new records were inserted correctly into the database tables.
This document provides contact information for Mr. Warawut Khangkhan, including social media and email addresses as well as a mobile number. It also references connecting a MySQL database to a dream, with code examples on lines like setting the character set to UTF8. The document gives technical instructions for linking a MySQL database with an application.
The document discusses database design concepts including entities, attributes, and relationships. It provides examples of different types of relationships between entities like one-to-one, one-to-many, and many-to-many. Specific examples include the relationship between customers and orders entities, and the attributes for each entity like customer name and order date. The document also shows how these concepts map to tables, records, and fields in a relational database.
This document discusses strategies and information systems. It covers corporate strategy, business strategy, and functional strategy. It also discusses strategic information systems and how information systems can help implement various strategies. Key frameworks discussed include the value chain model, value web, and synergies from network-based strategies.
This document contains C code that defines functions to perform basic math operations like addition, subtraction, multiplication and division. It includes a menu function that allows a user to select an operation and provides input/output to perform the calculation and display the result. The code takes in two numbers, performs the selected math operation, and prints the result.
This document provides instructions for connecting a Microsoft Visual Basic 2008 Express Edition project to an Access database and populating a list box with student data from a database table. The steps include creating a new Windows Forms project, adding list and button controls, connecting to an Access database file, selecting database tables, and writing code to retrieve and display student records in the list box on button clicks. The code uses a dataset and table adapter to fill the list box with student first and last names from the database.
The document discusses C language control structures including decision/selection statements like if-then, if-then-else, and nested if statements as well as loop/repetition statements like while, do-while, and for loops. It provides examples of each control structure and how to use break and continue statements to control loop execution.
This document discusses searching and filtering data in a database. It describes opening PHP files for displaying department and student data, renaming them to include search, and adding code to search specific fields. Code examples are provided to search a department code field and student first name field to return matching recordsets filtered by the search values. The document also covers adding multiple search conditions to further refine results.
The document describes the normalization of database tables from first normal form to fourth normal form. It shows sample data being structured into tables for products, orders, order details, and customers. The tables are normalized through each form by removing anomalies and non-key attributes to isolate dependencies and establish relationships through primary and foreign keys. By fourth normal form, the tables avoid update, insertion, and deletion anomalies through full normalization.
The document discusses using forms to add additional information to tables in a database. It describes creating forms to add departments and students to the tbl_department and tbl_student tables respectively. It includes designing the forms with various input fields, populating dropdown lists dynamically from the database, and submitting the form data to insert new records into the tables. The forms are then tested by viewing the submitted data in the browser and checking that new records were inserted correctly into the database tables.
This document provides contact information for Mr. Warawut Khangkhan, including social media and email addresses as well as a mobile number. It also references connecting a MySQL database to a dream, with code examples on lines like setting the character set to UTF8. The document gives technical instructions for linking a MySQL database with an application.
The document discusses database design concepts including entities, attributes, and relationships. It provides examples of different types of relationships between entities like one-to-one, one-to-many, and many-to-many. Specific examples include the relationship between customers and orders entities, and the attributes for each entity like customer name and order date. The document also shows how these concepts map to tables, records, and fields in a relational database.
This document discusses strategies and information systems. It covers corporate strategy, business strategy, and functional strategy. It also discusses strategic information systems and how information systems can help implement various strategies. Key frameworks discussed include the value chain model, value web, and synergies from network-based strategies.
This document contains C code that defines functions to perform basic math operations like addition, subtraction, multiplication and division. It includes a menu function that allows a user to select an operation and provides input/output to perform the calculation and display the result. The code takes in two numbers, performs the selected math operation, and prints the result.
This document provides instructions for connecting a Microsoft Visual Basic 2008 Express Edition project to an Access database and populating a list box with student data from a database table. The steps include creating a new Windows Forms project, adding list and button controls, connecting to an Access database file, selecting database tables, and writing code to retrieve and display student records in the list box on button clicks. The code uses a dataset and table adapter to fill the list box with student first and last names from the database.
The document discusses C language control structures including decision/selection statements like if-then, if-then-else, and nested if statements as well as loop/repetition statements like while, do-while, and for loops. It provides examples of each control structure and how to use break and continue statements to control loop execution.
1. The document discusses database design and normalization. It provides examples of product, order, and store tables.
2. The tables are normalized to first normal form by extracting repeating groups into separate tables and ensuring each cell contains a single value.
3. Primary keys are assigned to uniquely identify each record in tables. Foreign keys are also included to link related data across tables.
The document discusses database design concepts including entities, attributes, and relationships. It explains that entities can have a one-to-one, one-to-many, or many-to-many relationship. A one-to-one relationship means each record in one entity is linked to one and only one record in the other entity. An example given is a relationship between an order and its shipping details, where each order would have a single set of shipping details.
This document discusses GUI and event handling in Java. It begins by introducing GUI components like frames, panels, buttons, labels, text fields, lists, scroll panes, checkboxes, comboboxes and menus. It then covers various layout managers including flow, border, grid and gridbag layouts. Finally, it discusses event handling in Java by adding event listeners to components to trigger actions when events like button clicks occur.
The document discusses exception handling in Chapter 9. It introduces different types of errors like syntax errors and logical errors. It then defines exceptions and different types of exceptions like RuntimeException, ArrayIndexOutOfBoundsException, and ArithmeticException. The document explains different IOExceptions and how to use try, catch, and finally blocks to handle exceptions in Java code.
This document discusses abstract classes, interfaces, and multiple inheritance in Java. It includes definitions and examples of abstract classes and methods, how abstract classes can be extended, and how interfaces define abstract methods that implementing classes must implement. It notes that abstract classes can include both abstract and concrete methods while interfaces only contain abstract methods. The document also explains that Java supports multiple inheritance through interfaces, allowing classes to implement multiple interfaces, but not extend multiple classes.
This document discusses inheritance and encapsulation in chapter 7. It explains key concepts of inheritance including subclasses inheriting from superclasses. Methods can be overridden in subclasses. The final keyword is used to prevent overriding of methods. The document also covers encapsulation, which involves restricting access to members and hiding implementation details in an object.
This document discusses different types of methods in programming including instance methods, static methods, constructor methods, overloading methods, and overriding methods. It was written by Mr. Warawut Khangkhan and provides his contact information including an email address and social media profile. The document contains 4 pages or sections about methods.
The document discusses different types of data communication and telecommunication technologies. It describes data transmission and various components involved, including sender, receiver, messages, and communication protocols. It then covers different communication mediums such as twisted-pair cable, coaxial cable, fiber-optic cable, microwave transmission, satellite, infrared, radio, and cellular networks. Specific details are provided on the bandwidth and characteristics of each technology type.
The document discusses database systems and database management systems (DBMS). It describes the key components of a DBMS, including the data repository that stores data, the data dictionary that contains metadata, and the DBMS software. It also explains the three levels of schema in a database system - the external level visible to users, the conceptual level that defines the structure, and the internal level that defines how data is stored physically.
This chapter discusses different types of computer software, including system software like operating systems and utility programs, as well as application software for general use or specific tasks. It describes programming languages from early machine code to modern languages like JavaScript and Python. Open source software and licensing models are also covered.
This document discusses arrays and strings in Java. It covers one-dimensional and two-dimensional arrays, ArrayLists, methods for arrays like sort() and binarySearch(), and enum types. For strings, it explains string methods such as equals(), compareTo(), concat(), substring(), replace(), toUpperCase(), and indexOf(). It also covers StringBuffers and StringBuilders.
The document discusses AJAX and XML. It defines AJAX as Asynchronous JavaScript and XML, which allows web pages to be updated asynchronously by exchanging data with a web server behind the scenes. It also defines XML as a markup language that is commonly used to transport data in AJAX applications. Finally, it discusses how the XMLHttpRequest object allows JavaScript code in a web page to communicate with web servers to request and receive back data without interfering with the display and behavior of the existing page.
1) The document discusses different types of computer hardware, including supercomputers, mainframe computers, minicomputers, and microcomputers.
2) It describes the central processing unit (CPU) and its main components: the control unit, arithmetic/logical unit, and memory unit.
3) The document outlines different types of computer memory, including ROM, RAM, SDRAM, and DDR SDRAM.
The document discusses preparing to develop websites using Adobe Dreamweaver. It covers setting up a local web server using programs like AppServ or XAMPP, configuring Dreamweaver preferences, connecting Dreamweaver to a MySQL database, retrieving and modifying data using forms, and implementing user authentication and access restrictions. The chapter is presented by Mr. Warawut Khangkhan and focuses on foundational Dreamweaver functionality for web development.
The document discusses objects and classes in chapter 4. It covers key concepts of object-oriented programming including abstraction, encapsulation, inheritance, and polymorphism. It also covers the basics of classes, objects, attributes, methods, modifiers like static and final, and access modifiers like public, private, protected, and package. The document is presented by Mr. Warawut Khangkhan and includes his contact information.
The document discusses web application development. It covers static and dynamic web pages, with static pages using HTML only while dynamic pages involve server-side scripting languages like PHP. It also discusses HTML, CSS, JavaScript and how they are used to build the front-end interface of websites. Frameworks like ASP and PHP are explained as options for creating dynamic backend functionality through databases and server-side code. Overall it provides an introduction to the key concepts for planning and developing basic websites and web applications.
The document discusses different types of organizational systems. It describes transaction processing systems (TPS) which process routine business transactions like invoices. It also discusses management information systems (MIS) which take data from TPS and other sources to generate reports for managers. The document outlines other common systems used in sales, manufacturing, finance, and human resources. It also differentiates between operational, tactical, and strategic planning and management levels in organizations.
This document discusses different types of control structures in programming. It covers sequence control statements, selection control statements which include if, if/else, nested if, and switch statements. It also discusses iteration control statements like while, do/while and for loops. Finally, it briefly explains break and continue statements. The document contains examples of code for each of the control structure types.
This document discusses basic programming concepts in Java, including variables, data types, operators, and type conversion. It defines primitive data types like int, float, boolean and reference types like String. Arithmetic, relational, logical and bitwise operators are described along with examples. Implicit and explicit type conversion between data types is also covered. The document provides examples of declaring and initializing variables, using operators, and performing explicit type conversions in Java code.
The document is an introduction to Java and Object-Oriented Programming. It discusses what Java is, its history and key features like being free, robust with exception handling, and platform independent. It also covers Java development tools like NetBeans IDE and how to download and use NetBeans. The document contains step-by-step instructions for creating a simple "Hello World" program in Java using NetBeans.
1. VB .NET 2005 By Warawut Khangkhan Reference www.ilovelibrary.com
โครงสร&างของค*าส+,งภาษา VB .NET 2005 Express Edition
โครงสรางของคาสงภาษา VB .NET 2005 Express Edition
กฎของการต'งช)อ
การต+6งช8,อในภาษา VB ใช&สาหร+บการต+6งช8,อใด เช?น ช8อต+วแปร ช8,อคลาส ช8,อ Method โดยจะต&องมIกฎเกณฑM ด+งต?อไปนI6
* ,
1. ไม?ขนต&นด&วยต+วเลขหร8ออ+กขระพRเศษ
P6
2. ไม?มIอ+กขระพRเศษ
3. ไม?มIช?องว?าง
4. สามารถใช&ตวอ+กษร ด+งต?อไปนI6 (a-z, A-Z, 0-9, _ (Underline)) เท?าน+6น
+
5. ไม?ซ6*าก+บค*าสงวน (Reserve word) ของภาษา VB
6. สามารถใช&อ+กขระได& 255 ต+วอ+กษรต?อการต+6งช8อ 1 ช8อ
, ,
ต+วอย?างทI,ถdกต&อง
Hello, Test, Exam, Total, Net, SPC, V1, V3, Balance_score, MidtermScore
ต+วอย?างทIไม?ถdกต&อง
,
1Hello, Test%, E*xam, Balance score, MidtermScore*]
ต+วอย?างค*าสงวน
abstract else interface super
boolean extends long switch
break false native synchronized
byte final new this
case finally null throw
catch float package throws
char for private transient
class goto protected true
const if public try
continue implements return void
default import short volatile
do instanceof static while
double int strictfp
-1-
2. VB .NET 2005 By Warawut Khangkhan Reference www.ilovelibrary.com
โครงสร&างของค*าส+,งภาษา VB .NET 2005 Express Edition
ตวแปร (Variable)
ต+วแปร ค8อ พ86นทIในหน?วยความจ*าหล+กทI,ผ&เd ขIยนโปรแกรมสามารถจองไว&สาหร+บเกmบผลล+พธMทเ,I กRดจากโปรแกรม ทoก
, *
ภาษาทIใช&เขIยนโปรแกรมจะต&องมIการใช&ตวแปรนะคร+บ ซP,งใน VB มIรdปแบบการประกาศต+วแปร ด+งนI6
, +
ตวแปรตวเด4ยว
Dim ช8อต+วแปร as ชนRดต+วแปร
,
ตวแปรหลายตวท4เป;นชน=ดเด4ยวกน
Dim ช8อต+วแปร 1, ช8อต+วแปร 2, ช8อต+วแปร 3, ... as ชนRดต+วแปร
, , ,
เม8,อเราได&ก*าหนดระบบปฏRบ+ตRการจะท*าการเกmบพ86นทI,ในหน?วยความหล+กไว&ส*าหร+บต+วแปรทI,เราก*าหนดขP6น ไม?มIใครทI,จะ
สามารถเข&าไปใช&งานพ86นทI,หน?วยความจ*าในส?วนของเราได& ซP,งระบบปฏRบ+ตRการจะจองพ86นทI,หน?วยความจ*าไว&เท?าใดน+6นกmขP6นอยd?ก+บ
ชนRดของต+วแปรน+น โดยชนRดต+วแปรและขนาดของชนRดน+6นมIด+งนI6
6
1. ต+วเลขจ*านวนเตmม ได&แก? byte, short, integer, long
2. เลขจ*านวนจรRง ได&แก? float, double, single
3. ต+วอ+กษร ได&แก? char, String
4. ค?าตรรกะ ได&แก? boolean
ส*าหร+บชนRดต?างๆ น+6นจะมIขนาดข&อมdลทI,ตางก+น ด+งรdป
?
Type Name Kind of Value Memory Used Size Range
byte integer 1 byte -128 to 127
short integer 2 bytes -32768 to 322767
int integer 4 bytes -2,147,483,648 to 2,147,483,647
long integer 8 bytes -9,223,372,036,854,775,808 to
9,223,372,036,854,775,808
float floating point 4 bytes +/-3.4028... x 10+38 to +/-1.4023... x 10-45
double floating point 8 bytes +/-1.767... x 10+308 to +/-4.940... x 10-324
char single character (Unicode) 2 bytes All Unicode characters
boolean true of false 1 bit Not applicable
-2-
3. VB .NET 2005 By Warawut Khangkhan Reference www.ilovelibrary.com
โครงสร&างของค*าส+,งภาษา VB .NET 2005 Express Edition
การก*าหนดต+วแปรมI 2 แบบ
1. ก*าหนดต+วแปรแบบว?าง
ต+วอย?าง dim number as integer number
จากต+วอย?างนI6กmจะได&ต+วแปรว?าง ๆ 1 ต+วช8อ number
,
2. ก*าหนดต+วแปรแบบก*าหนดค?าเรRมต&นด&วย
,
ต+วอย?าง dim number as integer number
number = 7 7
ส*าหร+บต*าแหน?งของการก*าหนดต+วแปรในภาษา VB ไม?ได&ก*าหนดตายต+วแน?นอน แต?จะมIเร8,องของขอบเขตต+วแปรมา
เกI,ยวข&อง ซP,งจะได&อธRบายต?อไป
เคร)องหมายดาเน=นการ
หมายถPง เคร8องหมายต?าง ๆ ทI,ตองการประมวลผล ไม?วาจะเปwนต+วเลขหร8อต+วอ+กษร มIด+งนI6
, & ?
● บวก (+)
● ลบ (-)
● คdณ (*)
● หาร (/)
● หารเอาเศษ (%)
ลาดบความสาคญของเคร)องหมาย
คอมพRวเตอรMจะให&ล*าด+บความส*าค+ญของเคร8,องหมาย ซP,งถ&าหากพบเคร8,องหมายทI,หลาย ๆ เคร8,องหมายในบรรท+ด
เดIยวก+นกmจะเล8อกท*าก+บเคร8,องหมายทI,สาค+ญกว?า ซP,งเรIยงล*าด+บด+งนI6 ( ), *, /, %, +, - เช?น
*
ต+วอย?างทI, 1 a + b + c + d + e
เรIยงล*าด+บความส*าค+ญของเคร8องหมาย
,
1. a + b
2. (1) + c
3. (2) + d
4. (4) + e
ต+วอย?างทI, 2 a + b * c + d / e
เรIยงล*าด+บความส*าค+ญของเคร8องหมาย
,
1. b * c
2. d / e
3. a + (1)
4. (3) + (2)
-3-
4. VB .NET 2005 By Warawut Khangkhan Reference www.ilovelibrary.com
โครงสร&างของค*าส+,งภาษา VB .NET 2005 Express Edition
ต+วอย?างทI, 3 a / (b + c) - d % e
เรIยงล*าด+บความส*าค+ญของเคร8องหมาย
,
1. b + c
2. a / (1)
3. d % e
4. (2) + (3)
ต+วอย?างทI, 4 a / (b + (c + (d - e)))
เรIยงล*าด+บความส*าค+ญของเคร8องหมาย
,
1. d - e
2. c + (1)
3. b + (2)
4. a / (3)
เคร)องหมายเปร4ยบเท4ยบ
ใช&ก+บค*าส+,งในการเปรIยบเทIยบค?าต?าง ๆ โดยส?วนใหญ?ใช&รวมก+บค*าส+,ง If-else มIด+งนI6
?
สญลกษณL ความหมาย
> มากกว?า
< น&อยกว?า
= เท?าก+บ
>= มากกว?าหร8อเท?าก+บ
<= น&อยกว?าหร8อเท?าก+บ
not ไม?เท?าก+บ
and และ
or หร8อ
-4-
5. VB .NET 2005 By Warawut Khangkhan Reference www.ilovelibrary.com
โครงสร&างของค*าส+,งภาษา VB .NET 2005 Express Edition
การใสNหมายเหตO
บางคร+6ง การเขIยนโปรแกรม ผd&เขIยนเองกmต &องใส?ห มายเหตo ไ ปด&ว ย ซP ,ง หมายเหตoนI6 จะไม?ใช?ค * าส+, ง ของภาษา และต+ว
Computer เองกmจะไม?น*าไป Compile มIรdปแบบ ด+งนI6
ให&ใส?เคร8องหมาย (') ไว&ทI,หน&าบรรท+ดทI,ต&องการให&เปwนหมายเหตo
,
ต+วอย?าง
Public Class Form1
Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles
MyBase.Load
' บรรท+ดนI6หมายเหตo
Dim num As Integer
' บรรท+ดนI6กmหมายเหตo
End Sub
End Class
-5-