Free

What is SQL View - Essay Example

Comments (0) Cite this document
Summary
It is as a result of a statement due to a structured query language. They contain fields and records the way it is in a standard table, but the source is an original table existing in a real…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
What is SQL View
Read TextPreview

Extract of sample "What is SQL View"

Structured Query Language Insert Insert Discuss how SQL views are created, altered, and dropped, and then present the potential benefits of using an SQL view to manipulate your data.
A view is a resultant table that can be said to be virtual (Moris, February 4, 2014). It is as a result of a statement due to a structured query language. They contain fields and records the way it is in a standard table, but the source is an original table existing in a real database. In creating, altering and dropping a view I will consider students table contained in the school database.
Creating view
CREATE VIEW [students Above Average mark] AS
SELECT student_name, math_score
FROM students
WHERE math_score > (SELECT AVG (math_score) FROM students)
To query the above view, use the following
SELECT *FROM [students Above Average mark]
Updating a view
To update a view means that we are either replacing or creating a view (Rockoff, 2010). Considering the students table we want to add the class field to the current list of students.
CREATE VIEW [Current Student List] As
SELECT student_id, student_name, class
FROM students
WHERE Discontinued = No
Dropping a view
Dropping a view means deleting the view from the system, and the DROP VIEW will be used to complete the process successfully. For Instance to delete the current student list view, the syntax is shown below.
DROP VIEW [Current Student List]
The benefits of using an SQL view to manipulate my data are many. They involve the user choosing the data they need and offers an incredible platform for users to interact with the system. Also, DML has a variety of flavors and proficiencies among the vendors of the databases (Whitehorn & Marklyn, 2007). It also has the capability of changing whatever data is in the database.
References
Moris, C. C. (February 4, 2014). Database Systems: Design, Implementation & Management (11th Ed.). Cengage Learning.
Rockoff, L. (2010). The language of SQL. Australia: Course Technology PTR/Cengage Learning.
Whitehorn, M., & Marklyn, B. (2007). Inside relational databases with examples in Access. [New York]: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“What is SQL View Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
What is SQL View Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1684655-what-is-sql-view
(What Is SQL View Essay Example | Topics and Well Written Essays - 250 Words)
What Is SQL View Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1684655-what-is-sql-view.
“What Is SQL View Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1684655-what-is-sql-view.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF What is SQL View

SQL Training Course Experience

...?SQL TRAINING EXPERIENCE SQL Training Experience Affiliation Paper According to (SQL , structured query language (SQL) is a very important data manipulation language. It is used for developing different kinds of database management systems (DBMSs) such as MySQL, Oracle, DB2, Microsoft SQL Server, and Microsoft Access (SQLCourse, 2011). Additionally, at the present IT professionals and students from all over the world have a lot of alternatives for SQL training and classes. In this scenario, they can learn SQL by attending instructor-led SQL training courses, they can gain knowledge from...
4 Pages(1000 words)Research Paper

SQL Queries

...a. List the s of the who commenced a placement on exactly the same day as at least one other SELECT DISTINCT stu_f FROM Student, Placement WHERE (Student.stu_no=Placement.stu_no) And ((SELECT count( A.stu_no) FROM Placement A WHERE Placement.stu_no <> A.stu_no and Placement.pl_fdate = A.pl_fdate) ) > 0; Description In this query a sub query has been written in the WHERE clause to filter existence of any other student the on same day. b. List the names of all students who attended an event that was attended by a representative of 'Perception'. SELECT DISTINCT Student.stu_fname FROM Student, Event, Company, Representative, Student_attendance, Rep_attendance WHERE Company.co_id=Representative.co_id... List the s of the who...
3 Pages(750 words)Essay

Data Analysis by SQL

...decisions. SQL Statements Consumer Behaviour: The following view is initially created: Create View vw_Orders as select * from orderdetails left outer join orders on orders.orderID=orderdetails.orederID go 1. Monetary Value of Purchases: select CustomerID, (select [Company Name] from Customers where Customers.CustomerID=vw_Orders.CustomerID) as [Company Name], (select Country from Customers where Customers.CustomerID=vw_Orders.CustomerID) as Country, sum([unit price]*quantity) as Amount from vw_Orders group by CustomerID order by Amount desc 2. Frequency of Purchase: select CustomerID, (select [Company Name] from Customers where...
7 Pages(1750 words)Essay

Ch07_AviaCo database. SQL

...1. Write the SQL that will list the values for the first four attributes in the CHARTER table. SELECT CHAR_TRIP, CHAR_ AC_NUMBER, CHAR_DESTINATION FROM CHARTER Output: 2. Using the contents of the CHARTER table, write the SQL query that will produce the output shown in Figure P7.2. Note that the output is limited to selected attributes for aircraft number 2778V. SELECT CHAR_DATE, AC_NUMBER, CHAR_DESTINATION, CHAR_DISTANCE, CHAR_HOURS_FLOWN FROM CHARTER WHERE AC_NUMBER = 2778V Output: 3. Create the SQL query that will produce a list of customers who have an unpaid balance. The required output is shown in Figure P7.11. Note that the balances are listed in descending order. SELECT CUS_LNAME,...
2 Pages(500 words)Assignment

Complex SQL Benefits

...Ans # 1 The information shall be sourced and processed from the “Customer Details File”. In order to generate a report, a table was created with dummy data. See Appendix-I below containing the Design View & Report generated in MS Access – “Customer Volume by Month”: Ans # 2 (1) In case Customer Names/Driver Names require to be printed then a complex SQL Statement will have to be written for each table. The Statement shall logically join the two tables on ID – i.e. ID field in Master & ID field in Detail tables will need to be connected to retrieve the corresponding (Customer/Driver Name) information. (2) It would be very difficult to incorporate “Driver Performance by Month” in parallel with Month of...
1 Pages(250 words)Research Paper

SQL&Security

... in verification from the database. 5) The use of third party software to manage, FileZilla password might be the best way to go. This is because, FileZilla stores its passwords in plain text and they can easily be viewed in the windows platform. The use of software developed specifically for password encryption and management would solve this problem effectively. A tool such as TrueCrypt provides encryption solutions in the windows platform. This container based encryption method, will encrypt the passwords making them more secure. References Litchfield, D. (2003). SQL Server Security. New York: McGraw-Hill Osborne Media. .... SQL and Security Answers to the assignment SQL Injection is a form of database...
2 Pages(500 words)Assignment

SQL/PL Database project

...Yours PL/SQL Project Row Type: The %ROWTYPE is used to specify the field of data types taken from columns of the views or tables. The use of the %Row Type is illustrated in the following code (McLaughlin and Harper 34). For example, Triggers: Triggers in PL/SQL are the special stored programs which are triggered by the use of events for the given program. Triggers run between the issuance of a command and database management action is performed. There are five types of the triggers which belong to Oracle database 11g. Triggers are also fired in the response to the event of database. In the PL/SQL the trigger is a thing that appears in the normal block (McLaughlin and...
1 Pages(250 words)Essay

SQL database paper

...SQL Database SQL Database Data normalization is the process of strengthening the cohesion between the data attributes of a data model by eliminating (Ambler, 2013). The normalization process will be done in two phases i.e. First normal form (1NF) and second normal form (2NF). The naming convention would be to name the data model tables with descriptive names as follows: salesperson, tourcustomerdata toursold and tourrates. NTITY RELATIONSHIP DIAGRAM 1. IST Normal Form 1nf The goal of conforming the data model into 1NF is to eliminate any repeating attributes. The attributes tours sold repeats itself twice in the initial data model. The first step will form a new separate table for the tours sold...
3 Pages(750 words)Essay

NORMALIZATION AND SQL DDL STATEMENTS

...Normalization and SQL DDL ments By: First Last 8th December Database from Module 3 The database before normalization is as follows. Figure 1 Database before Normalization Tables The six tables forming the database have the following structure: Customer (num, name, address) Employee (num, name, city, state, emp_status*, emp_salary, emp_hiredate) Product (num, name, price) Invoice (num, customer_num*, emp_num*) Order (invoice_num*, product_num*) Emp_Job_Status (emp_status, emp_num*) 1NF Some of the database tables (Customer, Product, Invoice) are in their 1NF as the data in each field is atomic and has unique name, there is no data redundancy and each table has a unique primary key. Following changes are required to bring...
2 Pages(500 words)Essay

SQL Injection Vulnerabilities

...SQL Injection Vulnerabilities INTRODUCTION SQL injection is a of vulnerability that poses extremely high risks in the presentthreat landscape. The MITRE Common Weakness Enumeration (CWE) ranked SQL injection as first in the list of top 25 most dangerous software errors. Many high profile intrusions have demonstrated the exploitation of these vulnerabilities. Abundance of information exist on the prevention of SQL injection vulnerabilities; however, much of such information is always technically designed for the web application developers and not the general user community. This forms the basis of the article: to provide comprehensive guidance on the use of the open source...
5 Pages(1250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic What is SQL View for FREE!

Contact Us