Book Image

The MySQL Workshop

By : Thomas Pettit, Scott Cosentino
5 (1)
Book Image

The MySQL Workshop

5 (1)
By: Thomas Pettit, Scott Cosentino

Overview of this book

Do you want to learn how to create and maintain databases effectively? Are you looking for simple answers to basic MySQL questions as well as straightforward examples that you can use at work? If so, this workshop is the right choice for you. Designed to build your confidence through hands-on practice, this book uses a simple approach that focuses on the practical, so you can get straight down to business without having to wade through pages and pages of dull, dry theory. As you work through bite-sized exercises and activities, you'll learn how to use different MySQL tools to create a database and manage the data within it. You'll see how to transfer data between a MySQL database and other sources, and use real-world datasets to gain valuable experience of manipulating and gaining insights from data. As you progress, you'll discover how to protect your database by managing user permissions and performing logical backups and restores. If you've already tried to teach yourself SQL, but haven't been able to make the leap from understanding simple queries to working on live projects with a real database management system, The MySQL Workshop will get you on the right track. By the end of this MySQL book, you'll have the knowledge, skills, and confidence to advance your career and tackle your own ambitious projects with MySQL.
Table of Contents (22 chapters)
1
Section 1: Creating Your Database
6
Section 2: Managing Your Database
11
Section 3: Querying Your Database
16
Section 4: Protecting Your Database

Solution to Activity 1.1

These are the steps to solve Activity 1.1:

  1. Analyze the given table:

Figure 16.1 – A table of devices on the network

You can see that, currently, there does not appear to be a unique field, so this is something that needs to be added to create a 2NF table. In addition, observe that Hostname, Location, OperatingSystem, and Layerlevel are all text fields, giving you an idea of the proper data type.

  1. Specify the data types for the data contained in this table:

Figure 16.2 – The data types that are used for the table fields

Starting off, each column can be represented as varchar, since they are all text fields. Also, observe that the preceding table is in 1NF because every column contains a single value.

  1. Create a key that uniquely identifies the table. You will have to create a composite key of Hostname and Location, since the table has common hostnames.
  2. Once the...