Table of Contents
sql cheat sheet
Table of contents
Basics of SQL
Structure of SQL query
Comment in SQL
Data definition language (ddl)
Create a table
Modify the form
Add column
Delete a column
Modify columns
Rename table
Delete a table
Create an index
Delete the index
Data operation language (dml)
Insert data into table
Update data in table
Delete data from table
Data query language (dql)
Select data from the table
Wildcard
Data Control Language (dcl)
Grant permissions
Revoke permissions
join in
Inner connection
Left connection (or left outer connection)
Right connection (or right external connection)
Fully external connection
Subquery
Subquery in select
Subquery in where
Subquery in from
index
Unique index
Aggregation function
Count
and
Average voltage
Minimum and maximum values
Grouping and sorting
Grouping basis
have
Order basis
trade
Start trading
Conduct a transaction
Roll back transactions
Advanced sql
Case when
United and United All
Best Practices
in conclusion
Home Database Mysql Tutorial SQL Quick Reference: Simplify Database Management

SQL Quick Reference: Simplify Database Management

Apr 08, 2025 pm 06:21 PM
ai aggregate function

sql cheat sheet

This blog provides comprehensive guidance on the most important SQL commands and operations. It covers basic queries, connections, subqueries, indexes, and more advanced concepts.

Table of contents

  1. Basics of SQL
  2. Data definition language (ddl)
  3. Data operation language (dml)
  4. Data query language (dql)
  5. Data Control Language (dcl)
  6. join in
  7. Subquery
  8. index
  9. Aggregation function
  10. Grouping and sorting
  11. trade
  12. Advanced sql
  13. Best Practices

Basics of SQL

Structure of SQL query

 select column1, column2
from table_name
Where condition
order by column
limit n;
Copy after login

Comment in SQL

  • Single comment : -- This is a comment
  • Multiple comments :
 /* this is a 
     multi-line comment */
Copy after login

Data definition language (ddl)

Create a table

 create table table_name (
    column1 datatype [constraints],
    column2 datatype [constraints],
    ...
);
Copy after login

Example:

 create table employees (
    id int primary key,
    name varchar(100),
    age int,
    hire_date date
);
Copy after login

Modify the form

Add column

 alter table table_name
add column_name datatype;
Copy after login

Delete a column

 alter table table_name
drop column column_name;
Copy after login

Modify columns

 alter table table_name
modify column column_name datatype;
Copy after login

Rename table

 alter table old_table_name
rename to new_table_name;
Copy after login

Delete a table

 drop table table_name;
Copy after login

Create an index

 create index index_name
on table_name (column_name);
Copy after login

Delete the index

 drop index index_name;
Copy after login
Copy after login

Data operation language (dml)

Insert data into table

 insert into table_name (column1, column2, ...)
values ​​(value1, value2, ...);
Copy after login

Example:

 insert into employees (id, name, age, hire_date)
values ​​(1, 'john doe', 30, '2022-01-01');
Copy after login

Update data in table

 update table_name
set column1 = value1, column2 = value2, ...
where condition;
Copy after login

Example:

 update employees
set age = 31
where id = 1;
Copy after login

Delete data from table

 delete from table_name
where condition;
Copy after login

Example:

 delete from employees
where id = 1;
Copy after login

Data query language (dql)

Select data from the table

 select column1, column2, ...
from table_name
Where condition
order by column
limit n;
Copy after login

Example:

 select * from employees;
select name, age from employees where age > 30;
Copy after login

Wildcard

  • *: Select all columns
  • %: a wildcard with zero or more characters (in the like clause)
  • _: Wildcards representing only one character (in the like clause)

Example:

 select * from employees where name like 'j%';
Copy after login

Data Control Language (dcl)

Grant permissions

 grant permission on object to user;
Copy after login

Example:

 grant select, insert on employees to 'user1';
Copy after login

Revoke permissions

 revoke permission on object from user;
Copy after login

Example:

 revoke select on employees from 'user1';
Copy after login

join in

Inner connection

Returns rows when there are matches in both tables.

 Select columns
from table1
inner join table2
on table1.column = table2.column;
Copy after login

Left connection (or left outer connection)

Returns all rows in the left table and matched rows in the right table. If it does not match, the columns in the right table will display a null value.

 Select columns
from table1
left join table2
on table1.column = table2.column;
Copy after login

Right connection (or right external connection)

Returns all rows in the right table and matched rows in the left table. If it does not match, the columns in the left table will display a null value.

 Select columns
from table1
right join table2
on table1.column = table2.column;
Copy after login

Fully external connection

Returns rows when there is a match in one of the tables.

 Select columns
from table1
full outer join table2
on table1.column = table2.column;
Copy after login

Subquery

Subquery in select

 select column1, (select column2 from table2 where condition) as alias
from table1;
Copy after login

Subquery in where

 select column1
from table1
where column2 in (select column2 from table2 where condition);
Copy after login

Subquery in from

 select alias.column1
from (select column1 from table2 where condition) as alias;
Copy after login

index

Create an index

 create index index_name
on table_name (column1, column2);
Copy after login

Delete the index

 drop index index_name;
Copy after login
Copy after login

Unique index

Make sure that all values ​​in one column (or a group of columns) are unique.

 create unique index index_name
on table_name (column_name);
Copy after login

Aggregation function

Count

Calculate the number of rows that meet certain criteria.

 select count(*) from table_name where condition;
Copy after login

and

Returns the sum of the values ​​in the column.

 select sum(column_name) from table_name;
Copy after login

Average voltage

Returns the average value of the values ​​in the column.

 select avg(column_name) from table_name;
Copy after login

Minimum and maximum values

Returns the minimum and maximum values ​​in the column.

 select min(column_name), max(column_name) from table_name;
Copy after login

Grouping and sorting

Grouping basis

Group rows with the same value into summary rows.

 select column1, count(*)
from table_name
group by column1;
Copy after login

have

Apply group by to filter the group.

 select column1, count(*)
from table_name
group by column1
having count(*) > 5;
Copy after login

Order basis

Sort the result set in ascending or descending order.

 select column1, column2
from table_name
order by column1 desc;
Copy after login

trade

Start trading

 begin transaction;
Copy after login

Conduct a transaction

 commit;
Copy after login

Roll back transactions

 rollback;
Copy after login

Advanced sql

Case when

Conditional logic in the query.

 select column1,
       case
           When condition then 'result 1'
           When condition then 'result 2'
           else 'default'
       end as alias
from table_name;
Copy after login

United and United All

  • union : merges the result sets of two or more queries (delete duplicates).
  • union all : merge result sets (retain duplicates).
 select column from table1
union
select column from table2;

select column from table1
union all
select column from table2;
Copy after login

Best Practices

  • Use join instead of subquery when possible for better performance.
  • Index frequently searched columns to speed up queries.
  • Avoid select * and specify only the columns you need.
  • Use limit on the number of rows returned for large result sets .
  • Standardize your data to avoid redundancy and improve consistency.
  • Use the where clause instead of filtering the data before aggregation.
  • Test query performance, especially for large data sets.
  • Use transactions to ensure data consistency, especially operations involving multiple dml statements.

in conclusion

This sql cheat sheet covers all the basic sql commands and techniques required to use a relational database. Whether you are querying, inserting, updating, or connecting data, this guide will help you use SQL more effectively.


Copy after login

The above is the detailed content of SQL Quick Reference: Simplify Database Management. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Debian mail server firewall configuration tips Debian mail server firewall configuration tips Apr 13, 2025 am 11:42 AM

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

How to set the Debian Apache log level How to set the Debian Apache log level Apr 13, 2025 am 08:33 AM

This article describes how to adjust the logging level of the ApacheWeb server in the Debian system. By modifying the configuration file, you can control the verbose level of log information recorded by Apache. Method 1: Modify the main configuration file to locate the configuration file: The configuration file of Apache2.x is usually located in the /etc/apache2/ directory. The file name may be apache2.conf or httpd.conf, depending on your installation method. Edit configuration file: Open configuration file with root permissions using a text editor (such as nano): sudonano/etc/apache2/apache2.conf

How to optimize the performance of debian readdir How to optimize the performance of debian readdir Apr 13, 2025 am 08:48 AM

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

How to implement file sorting by debian readdir How to implement file sorting by debian readdir Apr 13, 2025 am 09:06 AM

In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

How debian readdir integrates with other tools How debian readdir integrates with other tools Apr 13, 2025 am 09:42 AM

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

Debian mail server SSL certificate installation method Debian mail server SSL certificate installation method Apr 13, 2025 am 11:39 AM

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

How Debian OpenSSL prevents man-in-the-middle attacks How Debian OpenSSL prevents man-in-the-middle attacks Apr 13, 2025 am 10:30 AM

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

How to do Debian Hadoop log management How to do Debian Hadoop log management Apr 13, 2025 am 10:45 AM

Managing Hadoop logs on Debian, you can follow the following steps and best practices: Log Aggregation Enable log aggregation: Set yarn.log-aggregation-enable to true in the yarn-site.xml file to enable log aggregation. Configure log retention policy: Set yarn.log-aggregation.retain-seconds to define the retention time of the log, such as 172800 seconds (2 days). Specify log storage path: via yarn.n

See all articles