List of Figures
Chapter 1:
Understanding SQL and Relational Databases
Figure 1-1:
Relational database terminology
Figure 1-2:
The
ProductDepartment
table
Figure 1-3:
The
Department
table and the
Product
table
Figure 1-4:
Two tables without a relationship
Figure 1-5:
A one-to-many relationship
Figure 1-6:
Adding a
DepartmentID
column to the
Product
table
Figure 1-7:
Illustrating primary key relationships
Figure 1-8:
A full representation of the primary key/foreign key relationship
Figure 1-9:
A many-to-many relationship
Figure 1-10:
A full representation of a many-to-many relationship
Chapter 7:
Querying Multiple Tables
Figure 7-1:
Inner join behavior
Figure 7-2:
Left outer join behavior
Figure 7-3:
Right outer join behavior
Figure 7-4:
Full outer join behavior
Chapter 9:
Using Stored Procedures
Figure 9-1:
Development Center's opening screen
Figure 9-2:
Naming the project
Figure 9-3:
Specifying whether you want to work online
Figure 9-4:
Setting up the connection details
Figure 9-5:
Choosing the type of object to create
Figure 9-6:
Naming the stored procedure
Figure 9-7:
Defining the stored procedure
Figure 9-8:
The
InsertStudent
stored procedure
Figure 9-9:
The Tools Settings dialog box
Figure 9-10:
Raising the exception back to the client
Chapter 10:
Transactions
Figure 10-1:
Choosing to automatically commit SQL statements
Chapter 11:
Users and Security
Figure 11-1:
Adding users
Figure 11-2:
Controlling permisssions
Chapter 12:
Working with Database Objects
Figure 12-1:
The relationship between
Phone
and
Friend
Chapter 13:
Triggers
Figure 13-1:
The
FriendAudit
table
Figure 13-2:
The
FriendAudit
table
Figure 13-3:
The
FriendAudit
table
Figure 13-4:
The
FriendAudit
table
Chapter 14:
Case Study: Building a Product Catalog
Figure 14-1:
The e-commerce store
Figure 14-2:
The relationship between the
Department
and
Category
tables
Figure 14-3:
Implementing the one-to-many relationship
Figure 14-4:
The relationship between the
Category
and
Product
tables
Figure 14-5:
The four database tables
Figure 14-6:
The
ProductCatalog
database in Enterprise Manager
Chapter 15:
Case Study: Implementing Role-Based Security
Figure 15-1:
The RBS database
Figure 15-2:
Retrieving a list of effective permissions for User 1
Figure 15-3:
Selecting the effective permissions for User 2
Figure 15-4:
Retrieving the list of roles assigned to a user
Appendix A:
Executing SQL Statements
Figure A-1:
Connecting to SQL Server
Figure A-2:
Executing queries in Query Analyzer
Figure A-3:
The results from a SQL Server query
Figure A-4:
Connecting to Oracle from SQL*Plus
Figure A-5:
Executing queries in SQL*Plus
Figure A-6:
The Script tab in DB2 Command Center
Figure A-7:
Providing a password to connect to DB2
Figure A-8:
Viewing output in DB2 Command Center
Figure A-9:
The Tool Settings dialog box
Figure A-10:
Viewing MySQL output in the command window
Figure A-11:
The tables in Access
Figure A-12:
Creating a new query in Access
Figure A-13:
The design view in Access
Figure A-14:
The skeleton
SELECT
statement generated by Access
Figure A-15:
The results from an Access query
Appendix B:
Setting up the InstantUniversity Database
Figure B-1:
The
InstantUniversity
sample database
Figure B-2:
Creating a new database