This article is reading notes, the first few articles see personal home page, and limited ability, hope to point out the insufficiency. As mentioned earlier,...
Data types in the database, mysql syntax for adding, deleting and modifying data and structures, and operation risks, column constraints (primary key, non-null, etc.).
The purpose of locking is to support concurrent access to shared resources and to ensure data consistency and integrity. Lock and latchlatch are lightweight locks...
Some containers automatically generate some data. This ensures data security by preventing data from disappearing when containers disappear. For example: the database container, the database...
Create example table and data explain column Detail ID column select_type column TABLE column IS NULL: mysql can decompose query statements during optimization phase, and...
💖✨MySQL 10000words in-depth summary, basic + advanced (1). A database is a computer software system that stores and manages data in a data structure. A...
While doing high-performance Java persistence training, I realized that it was necessary to explain how relational databases work, otherwise it would be difficult to grasp...
SonarQube is an open source code analysis platform that continuously analyzes and evaluates the quality of code in more than 20 programming languages, including Java,...
This is the seventh day of my participation in the August Challenge. The August Challenge Index is designed to improve the query efficiency of data,...
MySql server install MySql server install MySql server install MySql server install MySql server install MySql server install MySql server install MySql server install MySql...
My blog: the original centos install mysql 5.7 step 1: download for your mysql server RPM package download address: https://downloads.mysql.com/archives/communi
How does MySQL internally determine whether it is using indexes? How should paging queries, Joins, In, and Exsits be optimized? How should we design indexes...
Background In the process of project development, some Linux servers provided by Party A have strict control on security requirements, and may not provide root...