Table of Contents
Previous Section Next Section

List of Tables

Chapter 2: Retrieving Data with SQL

Table 2-1: Comparison Operators
Table 2-2: Basic Operators
Table 2-3: Wildcards
Table 2-4: Character-Matching Patterns

Chapter 3: Modifying Data

Table 3-1: The Professor Table

Chapter 4: Summarizing and Grouping Data

Table 4-1: Count Specification Keywords

Chapter 5: Performing Calculations and using Functions

Table 5-1: Bitwise Operators
Table 5-2: String Manipulation Functions
Table 5-3: Names of the Functions

Chapter 9: Using Stored Procedures

Table 9-1: Transact-SQL Options for Cursors
Table 9-2: DB2 Options for Cursors

Chapter 10: Transactions

Table 10-1: Sequence of Actions That Demonstrate Dirty Reads
Table 10-2: Sequence of Actions That Demonstrate Unrepeatable Reads
Table 10-3: Sequence of Actions That Explain the REPEATABLE READ Isolation Mode
Table 10-4: Sequence of Actions That Demonstrate Phantoms

Chapter 12: Working with Database Objects

Table 12-1: The Friend Table
Table 12-2: The New Record

Chapter 15: Case Study: Implementing Role-Based Security

Table 15-1: Bitmask Values
Table 15-2: The Users Table
Table 15-3: The Roles Table
Table 15-4: The PermissionCategories Table
Table 15-5: The Permissions Table
Table 15-6: The UserRoles Table
Table 15-7: The RolePermission Table
Table 15-8: Permission Assignments for User 2

Appendix B: Setting up the InstantUniversity Database

Table B-1: The Professor Table
Table B-2: The Course Table
Table B-3: The Room Table
Table B-4: The Class Table
Table B-5: The Student Table
Table B-6: The Exam Table
Table B-7: The Enrollment Table
Table B-8: The StudentExam Table

Appendix C: Data Types

Table C-1: Column Data Types
Table C-2: SQL Server Data Types
Table C-3: Oracle Data Types
Table C-4: DB2 Data Types
Table C-5: MySQL Data Types
Table C-6: Access Field Types

Table of Contents
Previous Section Next Section