Advanced Query Analysis

Slides:



Advertisements
Similar presentations
1 Copyright © 2005 M. E. Kabay. All rights reserved. 15:30-16:00 INFORMATION WARFARE Part 4: Assignment Advanced Course in Engineering 2005 Cyber Security.
Advertisements

1 Copyright © 2004 M. E. Kabay. All rights reserved. Database Design (2) IS 240 – Database Management Lecture #11 – Prof. M. E. Kabay, PhD,
Introduction to the Course IS301 – Software Engineering Lecture #1 – M. E. Kabay, PhD, CISSP Assoc. Prof. Information Assurance Division of.
Working with MS-ACCESS IS 240 – Database Management Lecture #2 – Assoc. Prof. M. E. Kabay, PhD, CISSP Norwich University
1 PRESS ENTER OR N TO GO TO THE NEXT SLIDE – P TO RETURN TO PREVIOUS SLIDE Copyright © 2004 M. E. Kabay, PhD, CISSP-ISSMP. All rights reserved CATA: Computer-Aided.
© 2010 Pearson Education, Inc. All rights reserved.
Chapter 2 Application Layer. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 2-2.
Mark Dixon Page 1 07 – Reports. Mark Dixon Page 2 Session Aims & Objectives Aims –To use reports to produce more readable documents Objectives, by end.
CS102--Object Oriented Programming Discussion 1: – Project 4 on Page 328 – The use of arrays Copyright © 2008 Xiaoyan Li.
Chapter 1 Computer Networks and the Internet. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 1-2.
Chapter 6 Human Capital. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 6-2.
© 2010 Pearson Education, Inc. All rights reserved.
Copyright © 2006 Pearson Addison-Wesley. All rights reserved. Chapter 14 Stabilization Policy in the Closed and Open Economy.
Chapter 16 Resources and the Environment at the Global Level.
Copyright © 2010 M. E. Kabay. All rights reserved. Analyzing and Building Simple Queries in SQL IS240 – Database Management Supplement to Chapter 4 M.
Lesson 31: Querying a Database. 2 Learning Objectives After studying this lesson, you will be able to:  Create, save, and run select queries  Design.
Working with MS-ACCESS IS 240 – Database Management Lecture #4 – Assoc. Prof. M. E. Kabay, PhD, CISSP-ISSMP Norwich University
What have we learned?. What is a database? An organized collection of related data.
1 Copyright © 2010 Jerry Post & M. E. Kabay. All rights reserved. Queries: Part 2 of 2 IS240 – DBMS Lecture # 7 – M. E. Kabay, PhD, CISSP-ISSMP.
Skills for Success with Microsoft Office 2013 Volume 1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Kris Townsend, Catherine.
McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. Supplement 7 Learning Curves.
Microsoft Access 2013 Create Professional Quality Output with Reports Chapter 5.
The number which appears most often in a set of numbers. Example: in {6, 3, 9, 6, 6, 5, 9, 3} the Mode is 6 (it occurs most often). Mode : The middle number.
21 Copyright © 2009, Oracle. All rights reserved. Working with Oracle Business Intelligence Answers.
ACCESS CHAPTER 2 Introduction to ACCESS Learning Objectives: Understand ACCESS icons. Use ACCESS objects, including tables, queries, forms, and reports.
DAY 7: ACCESS Rahul Kavi March 29,
IS301 – Software Engineering V:
Synthetic Division Examples
Working with MS-ACCESS
Chapter 1 Functions Copyright © 2010 Pearson Education, Inc. Publishing as Pearson Addison-Wesley.
IS301 – Software Engineering V:
Queries: Part 1 of 2 IS240 – DBMS Lecture # 6 –
Calculations & Parameters
M. E. Kabay, PhD, CISSP-ISSMP V:
IS301 – Software Engineering V:
Critical Systems Specification
IS301 – Software Engineering V:
IS301 – Software Engineering V:
IS301 – Software Engineering V:
Introduction: Course, SQ3R, Basic Concepts
IS301 – Software Engineering V:
Query Optimization Phases of query processing
Software Requirements
DB Integrity & Transactions Part 2
Using PowerPoint Effectively
Using Access to Implement a Relational Database
Supplement: Using the DBDesign System
Analyzing and Building Simple Queries in SQL
Critical Systems Validation
CATA: Computer-Aided Thematic Analysis™ Narrated Slide Show
Introduction to DBMS IS240 – DBMS Lecture #2 –
Chapter 20 Hash Tables.
Introduction to the Course
Requirements Engineering Processes
Data Mining, Second Edition, Copyright © 2006 Elsevier Inc.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Modeling Functionality with Use Cases
Copyright © 2012, Elsevier Inc. All rights Reserved.
Figures and Tables for Chapter 2 Digital Circuits
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 6 Dynamic Programming.
Copyright © 2013 Elsevier Inc. All rights reserved.
Figures and Tables for Chapter 5 Implementation Technologies
Chapter 4 Greedy Algorithms.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Presentation transcript:

Advanced Query Analysis IS240 – DBMS Supplement to Chapter 5 M. E. Kabay, PhD, CISSP-ISSMP Assoc. Prof. Information Assurance Division of Business & Management, Norwich University mailto:mkabay@norwich.edu V: 802.479.7937 Class Notes Copyright © 2004 M. E. Kabay. All rights reserved. Page 1

Topics Sally’s Pet Store: Problem 5-01 Start with Calculation of Order Values Save the Query Document the Query Query is Saved Then Use the Stored Query in the Complete Query Use TOP operator to Restrict Output Copyright © 2004 M. E. Kabay. All rights reserved. Page 2

Sally’s Pet Store: Problem 5-01 Which supplier has the highest average percentage of shipping cost per value of merchandise order? First, compute the value of each order Store the query as Query05_01a Then use the synthetic table of values from Query05_01a to prepare a new synthetic table Combines the supplier info with the order info Allows computation of percentage Sort data Copyright © 2004 M. E. Kabay. All rights reserved. Page 3

Start with Calculation of Order Values Copyright © 2004 M. E. Kabay. All rights reserved. Page 4

Save the Query Copyright © 2004 M. E. Kabay. All rights reserved. Page 5

Document the Query Copyright © 2004 M. E. Kabay. All rights reserved. Page 6

Query is Saved Copyright © 2004 M. E. Kabay. All rights reserved. Page 7

Then Use the Stored Query in the Complete Query Copyright © 2004 M. E. Kabay. All rights reserved. Page 8

Use TOP operator to Restrict Output Copyright © 2004 M. E. Kabay. All rights reserved. Page 9

DISCUSSION Copyright © 2004 M. E. Kabay. All rights reserved. Page 10