0% found this document useful (0 votes)
2 views

Lesson 1 Listing Capabilities of SQL SELECT Statements

The document outlines the fundamentals of SQL SELECT statements and data processing cycles, including methods and modes of data processing. It covers key concepts such as data storage units, SQL syntax, and database security, as well as the importance of data validation. Additionally, it includes assessments and criteria for evaluating database creation and management tasks.

Uploaded by

ALDRIN LLAGAS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Lesson 1 Listing Capabilities of SQL SELECT Statements

The document outlines the fundamentals of SQL SELECT statements and data processing cycles, including methods and modes of data processing. It covers key concepts such as data storage units, SQL syntax, and database security, as well as the importance of data validation. Additionally, it includes assessments and criteria for evaluating database creation and management tasks.

Uploaded by

ALDRIN LLAGAS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 60

Greetings!

Attendance check
CHAPTER
RETRIEVING DATA USING THE 1
SQL SELECT STATEMENT

Lesson 1: Listing Capabilities of SQL SELECT Statements


Lesson 2: Generating Report of Data from the Output of a Basic Select
Statement
Lesson 3: Using Arithmetic Expressions and NULL Values
Lesson 4: Implementing Column Aliases
Lesson 5: Describing Concatenation Operator, Literal Character Strings,
Alternative Quote Operator, and the Distinct Keyword
Lesson 6: Sorting and Restricting Data
Listing Capabilities of SQL
LESSON 1
SELECT Statements
Oracle SQL Tutorial 1 -
Intro to Oracle Database
https://www.youtube.com/watch?v=QHYuuXPdQNM&list=PL_c
9BZzLwBRJ8f9-pSPbxSSG6lNgxQ4m9
TECHNICAL TERMS

• Data – refers to facts, observations, assumptions, or occurrences


• Database – refers to an organized collection of information
• Data processing – refers to the process through which facts and
figures are collected and converted into useful information for future
use.
• SQL favor – refers to a variation that is based upon the industry
standards ANSI SQL example PL/SQL and Transact SQL
• SQL syntax – refers to a set of rules that defines how SQL
declarations, functions, commands, and other statements should be
arranged.
DATA STORAGE UNITS
ON THE COMPUTER
DATA STORAGE IS A TERM USED FOR
SORTING DATA FROM STORAGE SUCH AS
OPTICAL DISK, HARD DISK DRIVE,
FLOPPY DISK, AND OTHER REMOVABLE
STORAGE DEVICES. DIFFERENT TYPES
OF DATA STORAGE PLAY A VITAL ROLE IN
COMPUTING ENVIRONMENT. DATA IS
STORED IN THE COMPUTER IN A BINARY
FORM.
THE UNITS USED TO REFER TO THIS
BINARY DATA AS FOLLOWS:

1. BIT IS THE SMALLEST UNIT OF DATA STORAGE. A BIT


COULD EITHER BE O OR .1
2. NIBBLE IS A 4 BIT UNIT OF DATA OR HALF A BYTE.
THIS NOT COMMONLY USED TERM BECAUSE MOST OF
MICROPROCESSORS USE 8-BIT UNIT OF DATA OR
HIGHER.
3. BYTE (b) IS A UNIT OF DATA THAT IS EQUIVALENT TO
EIGHT BINARY DIGITS.
DATA PROCESSING CYCLE

Nowadays, data processing can be seen in one or


more computer systems. Majority of the processing that
takes place is within the software application. Data
processing plays a vital role because of the services it
offers such as data capturing, data conversion, data
digitizing, and many more. Data processing may be
divided into five separate but related steps
Five data processing cycle

ORIGINATION Input manipulation

output STORAGE
ORIGINATION
THIS IS THE FIRST STEP IN THE DATA
PROCESSING CYCLE. IN THIS STEP,
ALL SOURCE DOCUMENTS ARE
GATHERD SO THAT THESE CAN BE
USED FOR THE NEXT STEP.
INPUT
AFTER ALL OF THE SOURCE DOCUMENTS
GATHERED, THE INFORMATION OF THE
SOURCE DOCUMENT WILL BE INTRODUCED
INTO THE DATA PROCESSING SYSTEM. THIS
INFORMATION IS CREATED BY MEANS OF ANY
INPUT DEVICE SUCH AS KEYBOARD, MOUSE,
ETC.
PROCESSING
WHEN THE PIECE OF INFORMATION ARE
INPUTTED, PROCESSING WILL NOW TAKE PLACE.
SOURCE DOCUMENT WILL BE ALTERED TO
PRODUCE MEANINGFUL RESULTS. CLSSIFYING,
SORTING, CALCULATING, RECORDING, AND
SUMMARIZING ARE SOME EXAMPLES OF
FUNCTIONS THAT CAN BE DONE TO THE SOURCE
DOCUMENT.
OUTPUT
AFTER THE INFORMATION HAS BEEN
PROCESSED, THE RESULT, CALLED
THE OUTPUT, IS ACHIEVED.
STORAGE
ONCE THE OUTPUT HAS BEEN
CREATED, THIS OUTPUT CAN EITHER
BE STORED TEMPORARILY OR
PERMANENTLY SO THAT EVERYTIME A
USER WANTS TO USE THIS OUTPUT,
IT CAN BE RETRIEVED.
DATA PROCESSING METHODS
FOR THE SOURCE DOCUMENT TO BE
PROCESSED DIFFERENT METHODS ARE USED:
1. MANUAL METHOD – IN THIS METHOD SOURCED DOCUMENTS ARE
PREPARED BY USING TOOLS SUCH AS PENS, PENCILS, LEDGERS,
FILES, AND FOLDERS, AMONG OTHERS.
2. Mechanical Method – in this method, source documents are
manually prepared using mechanical equipment such as typewriter
and calculators.
3. Electronic method – in this method, source documents are
electronically prepared by the system. Batch processing and on-line
processing are the two modes in electronic method
Data processing modes

These modes of the data processing are


techniques used to process or sort the different
types of data. There are numerous processing
methods that dependend upon the capabilities
of the computer and type of data needed to be
processed by the user.
Data processing modes

1. batch processing – is the most inexpensive and efficient mode for


large organizations. This is a method of processing information in
which transactions are accumulated and stored until a specified
time. Batch processing is often used where large amount of data
needs to be processed.
2. Online processing - is a method of processing information in
which transactions are entered directly into the computeR and
processed immediately. Online processing is used when the
devices are directly under the control of a central processing unit
(CPU).
Data validation technique

computers do not have the capability to know what


particular data is right or wrong. To minimized such situations
that may sometimes lead to some erroneous output, data
must be validated within specific criteria to check for
correctness before being processed by the system. This
process is called data validation. In data validation, the
concept of garbage-in, garbage-out (GIGO) is used. It means
that whatever data that passes the system for validation will
be the same data that would be processed.
Sql concepts

Structured query language (SQL) is a


language used to query all database. It is easier
to learn and mostly used by different database
applications. Understanding and familiarizing
these sql concepts may help users to be more
versatile in getting information out of the
database.
Sql concepts
Relational database management system

a relational database that use concept


on linking two different tables that
comprise rows and columns. Any user can
create relationships between multiple
tables and display the output in a table
view as well.
table
a collection of related data
entries and it consist of columns
and rows.
field
Is a column in a table that is
designed to maintain specific
information about every record in
the table
Record or row
An individual entry that exist in the
table
column
a vertical entity in a table that
contains all information related to a
specific field in a table.
Null value
in a table a value in a field that seems
to be blank, which means a field with a
null value is a field with no value.
constant
is something with a fixed value. In
database jargon, alphanumeric
constants are also referred to as
strings.
variable
Is something that may have a
varying value over time, or even an
unknown value.
operators
Serve as input for operators.
expressions
Are a well-formed strings
containing variables, constants,
operators, or functions.
Controlling database access

Security is an important matter in


database. It allows or denies user action on
the database and also in the objects within
the database. In order to manage access to
these data and to limit the use of the
resources inside the database, oracle uses
schemas and security domains.
Database security
Controls the actions of users
who are accessing the
database. It allows or denies
any user action.
user
An account that can connect
and access object inside the
database.
schemas
Considered to bea group of
database object such as tables,
views, clusters, procedures,
and packages.
User authentication
means verifying the identify of something who
wants to use data, resources, or application. In order
for the information in the database to secured, a
database administrator use authentication methods
such as operating system, network service,
associated oracle database, oracle database of a
middle-tier application that performs transactions on
behalf of the user, and secure Socket layer (SSL)
protocol
Capabilities of sql select statements

retrieving data from any database is


carefully finished with the help of sql.
There are some related concepts from a
relational theory that include the capability
of the select statement and these are:
projection, selection, and joining
projection
In this operation, a certain
column or filed from table is
selected.
selection
In this operation, a subset of
rows or records in a table is
retrieved once it satisfies a
selection condition.
joining
In this operation, data are
combined from two or more
tables based on one or more
common column values.
complete the statements.

1. At the end of the lesson, I


learned that….
2. My greatest learning of the
lesson is . . .
ASSESSMENT
Directions: Choose
the correct answer
write your answer on
your notebook.
1. It is the most common and simplest form of data
storage in a relational database.

a. Row
b. Column
c. table
d. field
2. In this method, source documents are manually prepared
using equipment such as typewriter and calculator

a. Manual Method
b. Mechanical Method
c. Electrical Method
d. Electromechanical Method
3. In this method, source documents are prepared using tools
such as pens, pencils, ledgers, files, and folders, among others.

a. Manual Method
b. Mechanical Method
c. Electrical Method
d. Electromechanical Method
4. This is the vertical entity in a table that constrains all
information related to a specific field in a table.

a. row
b. column
c. table
d. field
5. In this operation, a certain column or field from a
table is selected

a. Selection
b. Projection
c. Joining
d. User authentication
6. It is a well-formed string containing variables,
constants, operators, or functions.

a. Constants
b. operators
c. Variable
d. expression
7. It is considered to be a group of database objects such as tables, views,
clusters, procedures, and package

a. User
b. Schema
c. Database security
d. user authentication
8. In this operation, a subset of rows or records in a table is
retrieved once it satisfies a selection condition.

a. Selection
b. Projection
c. Joining
d. User authentication
9. It controls the actions of users who are accessing the
database

a. User
b. Schema
c. Database security
d. user authentication
10. In this operation, data are combined from two or more tables
based on one or more common column values.

a. Selection
b. Projection
c. Joining
d. User authentication
BRAND MODEL CAMERA BATTERY PROCESSOR

1 SAMSUNG NOTE 8 64 MP 5000 Mah G980


2
3
4
5
6
7
8
9
10
CRITERIA 5 3 1
Outstanding Adequate Not Adequate

Table Creation Created all of the tables defined Created most of the tables Partially created some of the
in project requirements defined in project requirements tables defined in project
Named tables appropriately in Table name was a little unclear requirements
regard to their data elements in regard to its data elements Table name did not correlate to
its data elements

Relations and Cardinalities Correctly interpreted all the Correctly Interpreted most Incorrectly Interpreted the
Business Rules and created all Business Rules and created Business Rules, few relations
necessary relations with clear most of the necessary relations were created and few
indication to the cardinalities with some indication to indications to Cardinalities and
and observing the three cardinalities and observing at Normal forms
normalizations forms. least two normal forms.

Keys and Entities Correctly choose all primary and Correctly choose most of the Incorrectly choose most of the
foreign keys respecting the primary and foreign keys primary and foreign Keys, and
naming convention respecting the naming somehow respected the naming
convention convention

Implementation Completely populated tables Populated tables with majority Populated tables with minimal
with correct data elements of data elements outlined in the data elements defined in project
reflecting the ERD design ERD design the ERD design

Mechanics Accurately entered data Entered data elements into Multiple keypunch errors when
elements into tables with no tables with minimal keypunch entering data elements into
keypunch errors errors tables
No spelling or grammar errors in Some minor spelling or Numerous errors.
database documentation grammar errors evident in
documentation

Reports Created all of the reports Created some of the reports Created minimal reports needed
needed for the as defined in needed for the company as for the company as defined in

You might also like