11 Most Common MySQL Mistakes PHP Programmers Make
For most web development applications, the database is a very basic part. If you're using PHP, you're probably also using MySQL—an important member of the LAMP family.
For many novices, using PHP can easily write code with specific functions in just a few hours. However, building a stable and reliable database requires some time and skills. Listed below are the 11 worst MySQL-related mistakes I have ever made (some of which are also reflected in the use of other languages/databases).
1. Use MyISAM instead of InnoDB
MySQL has many database engines, but the ones you are most likely to encounter are MyISAM and InnoDB.
MySQL uses MyISAM by default. However, this is a poor choice in many cases unless you are creating a very simple or experimental database. Foreign key constraints or transactions are very important for data integrity, but MyISAM does not support these. In addition, when a record is inserted or updated, the entire data table is locked, which will produce very poor operating efficiency when usage increases.
The conclusion is simple: use InnoDB.
2. Use PHP’s mysql function
PHP has provided MySQL library functions since the day it was created (or near as makes no difference). Many applications still use functions like mysql_connect, mysql_query, mysql_fetch_assoc, etc., although the PHP manual says:
If you are using MySQL v4.1.3 or newer, it is strongly recommended that you use the mysqli extension.
mysqli (an enhanced version of MySQL extension) has the following advantages:
Optional object-oriented interface
Prepared expressions, which helps prevent SQL injection attacks and improve performance
Supports more expressions And transaction processing
In addition, if you want to support multiple database systems, you can also consider PDO.
3. Not handling user input
This can be said like #1: Never trust user input. Validate each string with server-side PHP, don't rely on JavaScript. The simplest SQL injection attack will use the following code:
$username = $_POST["name"]; $password = $_POST["password"]; $sql = “SELECT userid FROM usertable WHERE username=’$username’ AND password=’$password’;” // run query…
Just enter "admin';–" in the username field, and you will be hacked. The corresponding SQL statement is as follows:
SELECT userid FROM usertable WHERE username=' admin';
Cunning hackers can log in as admin, they don't need to know the password because the password field is commented out.
4. UTF-8 is not used
We in the United States, the United Kingdom and Australia rarely consider other languages except English. We proudly complete our "masterpieces" only to find that they don't work well elsewhere.
UTF-8 solves many internationalization problems. Although it is not well supported before PHP v6.0, this does not prevent you from setting the MySQL character set to UTF-8.
5. Prefer PHP to SQL
If you have been exposed to MySQL for a short time, then you will tend to use the language you have already mastered to solve problems, which will lead to writing some redundant and inefficient code. For example, you wouldn't use the AVG() function that comes with MySQL, but you would first sum the values in the recordset and then use a PHP loop to calculate the average.
Also, please pay attention to the SQL query in the PHP loop. Generally speaking, it is more efficient to execute a query than to iterate through the results.
Therefore, please take advantage of the database system when analyzing data. It will be of great benefit to know some SQL knowledge.
6. Not optimizing database queries
99% of PHP performance problems are caused by the database. Just one bad SQL query can completely paralyze your web application. MySQL's EXPLAIN statement, Query Profiler, and many other tools will help you find these evil SELECTs.
7. Inability to use data types correctly
MySQL provides data types such as numeric, string and date. If you want to store a time, use the DATE or DATETIME type. If you use the INTEGER or STRING type at this time, it will make the SQL query very complicated, provided that you can use INTEGER or STRING to define that type.
Many people tend to customize some data formats without authorization, for example, using string to store serialized PHP objects. This may make the database easier to manage, but it makes MySQL a poor data store and is likely to cause failures later.
8. Use * in queries
Never use * to return data for all columns of a data table. This is laziness: you should extract the data you need. Even if you need all the fields, your data table will inevitably change.
9. Do not use indexes or overuse indexes
The general principle is this: any field represented by the wher clause in the select statement should use an index.
For example, suppose we have a user table, including numeric ID (primary key) and email address. When logging in, MySQL must look up the correct ID based on an email. If an index is used (here, email), then MySQL can use a faster search algorithm to locate the email, even instantaneously. Otherwise, MySQL can only check each record sequentially until it finds the correct email address.
Some people will add indexes to each field. Unfortunately, these indexes need to be regenerated after executing INSERT or UPDATE, which will affect performance. So, only add indexes when needed
10. Forgetting to back up
Although it is rare, there is still a risk of database crash. Hard drives can get damaged, servers can crash, and web hosting providers can go bankrupt! Losing your MySQL data would be catastrophic, so make sure you have automated backups in place or have copies in place.
11. Bonus mistake-Do not consider using other databases
For PHP developers, MySQL may be the most widely used database system, but it is not the only choice. PostgreSQL and Firebird are the strongest contenders: both are open source and neither has been acquired by a company. Microsoft offers SQL Server Express and Oracle offers 10g Express, both of which are free versions of enterprise-class databases. Sometimes, for a smaller web application or embedded application, SQLite can be a viable alternative.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

If you are an experienced PHP developer, you might have the feeling that you’ve been there and done that already.You have developed a significant number of applications, debugged millions of lines of code, and tweaked a bunch of scripts to achieve op

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.
