Friday, May 31, 2019

An Argument For Gay Marriage Essay -- Persuasive Essays, Argumentativ

The Supreme Court of the United States ruled that the Constitution guarantees a near to same-sex marriage. Yet, same-sex marriage continues to be a highly debated issue that leaves our society searching for answers. As a child, I was brought up in a Christian home, where Christian ethics and values were instilled in me. I was always taught that you should obey your parents and God, that you should not lie, cheat, or steal, and that God was always watching you I was also taught that transvesticity was wrong. As the years have passed, I have been confronted with the issue of homosexuality many times firsthand, and I believe that though homosexuals are not terrible tidy sum because of their sexual orientation, their lifestyle is still wrong. In recent years, the topic of homosexuality and gay and lesbian marriages has also become prominent in American politics. The foreland of whether these marriages, also sometimes referred to as civil unions, should be legalized has bec ome a pressing issue, and one that has only begun to test the limits and limitations of the US Constitution. The notion that such a thing as sodomy could ever be legalized is causing civil distress and has become quite a point of contention for countless Americans. For, on the one hand, many argue that allowing such marriages would corrupt the morals and society of the United States, yet others respond that Americans should all have the equal opportunity to deuce-ace happy and fulfilled lives. In the end, I have concluded that while it counteracts my religious beliefs, there must be some allowance made by the US government for same sex couples to gain recognition for their commitment to one another. I have found that the majority... ...he American government, it should logically follow that these couples would therefore be enabled to receive the same rights and responsibilities as their heterosexual counterparts in the eyes of the State. In summary, while I personally do not believe in the idea of gay marriages, I do not believe such civil unions can constitutionally be denied by the State. Heterosexuals are given every(prenominal) right to pursue happiness with their life partners, and so it does not appear that, from a legal standpoint, such a right can be denied to homosexual couples. Under the hospices of a civil union, homosexuals would thus be able to publicly commit themselves to their life partners and accordingly be afforded the same privileges as those which their heterosexual counterparts enjoy. transvestic unions should be legalized in the American system of government.

Thursday, May 30, 2019

Love, Betrayal, Hubris, and Relationships in Cyrano de Bergerac Essays

Love, Betrayal, Hubris, and Relationships in Cyrano de Bergerac French authors and playwrights have been acclaimed worldwide for their dynamic prose, complex situations, and unpredictable endings. The same praises hold true(p) for Edmond Eugene Alexis Rostand. Born of Provencal ancestry on April 1, 1868, Rostand was well-learned, as evidenced by his extensive childhood education as a student of the lycee of Marseille. His spawn was a prominent member of the Marseille Academy. As a direct result of this high influence, Rostand concluded his studies at the College Stanislas in Paris. He studied, under the direction of the then-renowned professor Rene Doumic, the works of those creme de la creme authors held in high esteem -- Victor Hugo, Alfred de Musset, and William Shakespeare. His interactions with both Spanish and French cultures helped augment his success as a dramatic poet. Furthermore, Rostand back up Emile Zola in supporting Captain Dreyfus, who was unjustly convicted of treason (Kahr 186).As a Meridional, Rostand was heavily inspired by Victor Hugo. In college, Rostand found a literary world . . . where naturalism and exoticism flourished (vii). This attitude was formed as a result of the catastrophic Franco-Prussian War of 1870. As a member of the 1880s generation, Rostand was similarly influenced to become the ideal Romanticist of his time. Rostands fourth play, Cyrano de Bergerac, afforded him the most fame. Rostand generally modeled his plays after traditional, romantic subjects and settings. A vast majority of the success of Rostands play hindquarters be accredited to an interesting plot, a rich and sophisticated vocabulary, and real-life dialogue (to those of his lifetime). Cyrano de Bergerac, the play, debuted ... .... Rostand, Edmond. The New Book of Knowledge. 1994 ed. Rostand, Edmond. The New Encyclopedia Britannica. 22nd ed. 1994. Outline I. Introduction A. mount B. Inspiration II. Leading to Cyrano A. Reasons B. Rostands style C. Debut III. Precis of Cyrano IV. Commenting on Cyrano A. Length of Play B. Mentality of Cyrano characters C. Examples V. Rhetoric devices A. Tone 1. Commentary-example 1 2. Commentary-example 2 B. Diction 1. Commentary-example 1 2. Commentary-example 2 C. Point of view 1. Commentary-example 1 2. Commentary-example 2 VI. boilersuit Theme A. Major Theme B. Subsequent major themes VII. Conclusion A. Issues emphasized B. Rhetoric devices C. Overall conclusion of Rosatnds work D. Clincher

Wednesday, May 29, 2019

Rhetorical Analysis of the Film, Waiting for Superman Essay -- Film An

Educational systems in America argon impaired, and the very educators that are meant to acquire are the ones pulling it down. That is the apparent center that Davis Guggenheim attempts to convey in his documentary Waiting for Superman. He uses many strategies to get his message across. few of these include cartoons, children, and those reformers that are attempting to pull the system bring out of the ditch that it has found its way into. He makes his point very well, and uses facts and figures correctly. He does leave out some of the opinions of the opposing views, but it does not take away from his point that the educational system in America is in need of repair.Guggenheim uses those and other devices to barrack action within the masses, and highlight a topic that has been recently shrouded by other problems our nation faces today. He also places blame upon the system itself, many reasons affix to this conclusion such as refusal to make change, with tenure being the central i dea that cripples education. Guggenheim focuses his documentary on the teachers that make-up a large portion of the system. unity of his strongest arguments is that the teachers are the problem, and the inability to rid schools of the incompetent teachers is the primary reason American schools are coming in so low in the international rankings. He also shares many facts and statistics that are staggering by their lonesome, but he presents them in such a way to exaggerate them by use of animation, music, and narration. Some of these animations add visuals when a complex idea is being described, such as the idea of the lemon dance or the rubber room in sore York. Guggenheim also takes the idea of tenure and uses these techniques to twist tenure into somethi... ... and our sense of guilt with his documentary. Which, while is not the most admirable technique, it causes the audiences to start thinking about what they are doing to help or hurt the educational system, and what our kids are receiving from the educators around them.This film is one that has faults, but is also very credible and a major wake-up mobilise for those currently in power to make a change and help improve the schools of America, securing a better future for all.Works CitedPatterson, James. Where are you Superman? Rev. of Waiting for Superman. (June 2011) pedantic Search Complete. Web. 3 Nov. 2011. Schwarzbaum, Lisa. Waiting for Superman Rev. of Waiting for Superman. (October 2010) Academic Search Complete. Web. Nov. 2011Guggenhaim, Davis. Waiting for Superman. 2010. Film.

Wedding Speech by the Sister of the Bride -- Wedding Toasts Roasts Spe

Wedding Speech by the Sister of the BrideFor those of you that do not already know me Im the brides slightly older sister. When she first asked me to breach her away I felt two things, the first was one of extreme and enormous pride that shed asked me, and the second Was Oh my God I have to do a speech. But please dont worry, this wont take too long.I would like to thank the priest for a lovely service, the priests boss for keeping an eye let on on the weather, and the beautiful bridesmaid. I am also delighted to have my mom, sisters, and brother here today to celebrate this day, one which I hope is the start of many more happiest days of their life.My sister has given me, and all of my family some incredibly happy and joyous moments over the years. She was a delight to grow up with, and has always provided us with some memorable moments. Having known her all her life I have a huge library of stories to leave her embarrassed and humiliated, but out of respect for her on her big d ay I have decided not to tell them.So Im not going to tell you about the milkma...

Tuesday, May 28, 2019

The Power of Title IX Essay -- gender equity in sports

Title IX is a law passed in 1972 that requires gender equity for boys and girls in every educational program that receives federal funding (U.S. segment of Education, 2007). No person in the United States shall, on the basis of sex, be excluded from participation in, be denied the benefits of, or be subject to discrimination under any educational programs or activity receiving federal financial assistance. From the preamble to Title IX of the Education Amendments of 1972 (U.S. Department of Education, 2007). The actual Title IX document was found on 10 key areas (1) access to higher education (2) employment, (3) athletics, (4) career education (5) education for pregnant and parenting students, (6) employment learning environment, (7) math and science, (8) sexual harassment, (9) convertible testing and (10) technology (titleixinfo.com.2011). Title IX legislation has been subject to over 20 additional reviews and proposed amendment revisions due to the different interpretation s and mannerstyle changes that present themselves in their various court cases. History of Title IX Title IX is historically related to the social changes that were be approach increasingly noticed after the Civil Rights laws were coming to light. These social changes represented a national commitment to end discrimination and establish a mandate to bring the excluded into the mainstream (U.S. Department of Education, 2007). It was the federal government that utilise these laws, created by Title IX, to deliver the promise of all peoples equal opportunities and rights guaranteed by the United States Constitution to develop their talents. As an early congressman of the barriers set up before Title IX, Luci Baines Johnson, daughter of President J... ...opportunities in athletics and extra- curricular activities. A woman should never be forced to do anything different then a man just because of her sex. This author agrees with the decision that the woman in this case shou ld not have been sent home for a mandatory leave of absence. This is prejudice at its best. Participating in the pre-game activities of Super Bowl XLV, there was a young girl who won a competition that presented her the opportunity to carry the game ball out on the field before the coin toss. This young girl stated in an interview that it is her life long goal to become a kicker in the National Football League (NFL). This is Title IX at its best. A young girl with a dream a dream to do something that no other girl has ever done before a dream to step foot in a mans world and be allowed the equal opportunity to accomplish HER dream.

The Power of Title IX Essay -- gender equity in sports

Title IX is a law passed in 1972 that requires gender equity for boys and daughters in every educational program that receives federal funding (U.S. Department of Education, 2007). No person in the United States shall, on the basis of sex, be excluded from participation in, be denied the benefits of, or be subject to discrimination under any educational programs or activity receiving federal financial assistance. From the preamble to Title IX of the Education Amendments of 1972 (U.S. Department of Education, 2007). The tangible Title IX document was based on 10 key areas (1) access to higher education (2) duty, (3) athletics, (4) career education (5) education for pregnant and parenting students, (6) employment learning environment, (7) math and science, (8) sexual harassment, (9) standardized testing and (10) technology (titleixinfo.com.2011). Title IX legislation has been subject to over 20 additional reviews and proposed amendment revisions due to the diverse interpretati ons and lifestyle changes that present themselves in their various court cases. History of Title IX Title IX is historically related to the social changes that were becoming progressively noticed after the Civil Rights laws were coming to light. These social changes represented a national commitment to end discrimination and establish a mandate to knead the excluded into the mainstream (U.S. Department of Education, 2007). It was the federal government that utilized these laws, created by Title IX, to deliver the promise of all peoples equal opportunities and rights guaranteed by the United States personality to develop their talents. As an early example of the barriers set up before Title IX, Luci Baines Johnson, daughter of President J... ...opportunities in athletics and extra- curricular activities. A char should never be forced to do anything different then a man just because of her sex. This author agrees with the decision that the woman in this case should not have been sent home for a mandatory leave of absence. This is prejudice at its best. Participating in the pre-game activities of Super Bowl XLV, there was a unripened girl who won a contest that presented her the opportunity to carry the game ball out on the field before the coin toss. This young girl stated in an interview that it is her life long goal to become a kicker in the National Football League (NFL). This is Title IX at its best. A young girl with a dream a dream to do something that no other girl has ever done before a dream to step foot in a mans world and be allowed the equal opportunity to accomplish HER dream.

Monday, May 27, 2019

Intrusion Detection Systems Essay

A user with full permissions and who misuse his powers. Clandestine user A user who acts as a supervisor and tries to use his privileges so as to avoid being captured. edit Types of incursion sensing arrangings For the purpose of dealing with IT, there are two main types of IDS Network intrusion detection system (NIDS) It is an independent platform that identifies intrusions by examining profits traffic and monitors multiple hosts. Network intrusion detection systems gain access to network traffic by connecting to a network hub, network switch configured for port mirroring, or network tap.In a NIDS, sensors are located at choke points in the network to be monitored, often in the demilitarized zone (DMZ) or at network borders. Sensors captures all network traffic and analyzes the content of individual packets for malicious traffic. An example of a NIDS is Snort. Host-based intrusion detection system (HIDS) It consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability databases, Access control lists, etc. ) and other host activities and state.In a HIDS, sensors usually consist of a software agent. nearly application-based IDS are similarly part of this category. An example of a HIDS is OSSEC. Intrusion detection systems can also be system-specific using custom tools and honeypots. In the case of strong-arm building security, IDS is defined as an alarm system designed to detect unauthorized entry. edit Passive and/or reactive systems In a passive system, the intrusion detection system (IDS) sensor detects a potential security breach, logs the information and signals an alert on the console and or owner.In a reactive system, also known as an intrusion prevention system (IPS), the IPS auto-responds to the suspicious activity by resetting the connection or by reprogramming the firewall to block network traffic from the venture malicious source. The term IDPS is commonly used where this can happen automatically or at the command of an operator systems that both detect (alert) and/or prevent. edit comparability with firewalls Though they both relate to network security, an intrusion detection system (IDS) differs from a firewall in that a firewall looks outwardly for intrusions in order to stop them from happening.

Sunday, May 26, 2019

Language Analysis the Power of Ink Essay

Helen Day is a part-time journalist and communicateger. She maintains her communicate entitled Street beat on a variety of current social issues. This blog entry, The Power of sign, is about tattoos and it has drawn a variety of responses from readers of her blog.In recent years, the practice of inking your body, or having tattoos indelibly imprinted on your skin has become almost de rigueur for some in our society, especially the young. There is a wide variety of views about this practice and Helen Day, a regular blogger, has her say in her entry The Power of Ink. Rather than lecturing her substantial audience of followers, Day chooses simply to trace the stages of the history of tattoos, foc use on the changes in their heart and significance. Her use of examples and language with banish connotations is effective in arguing that people who choose to adorn themselves with tattoos ar just as much victims or prisoners as those for whom they were originally intended. Her blog att racted quaternion extremely varied responses within the next twenty four hours, showing that this is indeed a contentious issue. Helen Day begins by establishing the ubiquitous nature of tattoos. In a light-hearted, humorous fashion, she mentions that people from all walks of life, including suburban housewives, newsreaders and sitcom stars have words and pictures drawn on their skin.Even at this early stage, she mentions prison and readers may feel uncomfortable with this reference, which is just what the writer intends. She clearly states her contention that the power of ink has diminished. Day begins her argument by clearly establishing the original purpose of tattooing, using examples from millennia as support. She mentions the origins of the practice where the unconsenting backs of prisoners and slaves were give awayed to show that they were owned, deviant or incarcerated. She goes further to remind readers of the literal and metaphorical indelible cruelty of the tattoos for ced upon inmates of the Nazi ingress camps during World War 11. Her words are carefully chosen at this stage of her argument to create a feeling of unease and repulsion in her audience at the idea that tattoos represented possessorship or control and that those on whom they were imposed were considered to be somewhere between property and machine.By associating tattoos with lack of free will or self-determination, she predisposes her readers to think negatively of the practice of tattooing, even before she considers what it represents in contemporary society. Day goes on to provide an congresswoman of how those forced to wear tattoos resented this imposition and how they showed their refusal to be controlled, satirising their owners by adopting their own version of an owners mark. She connects this act of defiance to the motivation behind her decision to picture her feminist principles in the 1990s, wryly remarking that her attempt to protest and be unique fell flat because now e ven the British Prime Ministers wife has an ankle tattoo. The language the writer uses here is quite mocking of her young self. She separates herself from the young Helen, representing her actions as clich and immature, in an attempt to position her readers to view it in the same way. The comment from young Tash (written late at night) is a perfect example of such (some might say misguided) youthful impulsiveness.Readers can hear the tempestuousness in Tashs voice as she describes how she designed her own ankle bracelet and how she likes to show it off. The use of language such as like and yeah, suggests that she is very young and may one day regret her decision just as Helen Day does. The comment from Cleanskin also echoes Days point that tattoos fade and stretch over time and may not suit an older person. These responses underline the writers message of act in haste, repent at leisure and young readers may cringe when reading Tashs enthusiastic comment. Day concludes her blog en try by redefining the social meaning of tattoos in todays society. She describes them as having been commodified, that is, just something else to be bought and sold and with no real significance. She uses the expression try hard, suggesting that people who have tattoos are doing so to create a false image of themselves in order to find acceptance. Readers would certainly not like to be included in this category. By describing tattoos as fashions proprietary mark, she is claiming that those who decide to tattoo themselves are just as much slaves and prisoners as the original bearers of these marks, it is just that their owner is now fashion.In suggesting that tattoo wearers are still under the control of an outside force, thatfashion trends are dictating their actions, she hopes that readers will review their attitude to the practice. The secern between the two accompanying images starkly demonstrates the writers argument that the meaning of tattoos has changed. The Ta Moko on the a rms of the three Maori men clearly mark them as members of the same clan. The three tattoos are identical to each other, suggesting that the design is traditional and has a particular significance for the wearers. Kiwis indignant interpretation of non-Maoris imitating the sacred Ta Moko as identity theft would act as a strong disincentive to readers to undertake such a disgraceful and criminal action. The other shoulder tattoo of a star, shown on the front cover of Sam de Britos 2006 book, might well have been designed by the wearer, exactly it has none of the cultural weight of the Ta Moko designs.The images reinforce the idea that it may be fashion that is dictating the current trend to tattoo ones skin. This blog is certainly cause for thought. Although Helen Day sets out to argue that the power of ink has diminished, she actually argues against this. In establishing the contention that tattoos are still just as powerful a message about ownership, but that the owner has change d from government and slave owner to the tyrant of fashion, she prompts her online audience to rethink whether in deciding to ink themselves they are actually being a unique rebellious individual or just another fashion victim.

Saturday, May 25, 2019

Personailty Disorders in the Workplace

muckle with personality swages characteristic tend to swallow chronic inflexible styles of perceiving themselves, and interacting with others varies. (Ward, 2004) Personality disorders are typically slightly of the most challenging mental disorders to treat, because they are part of an individual and their self-perception. Treatment fit in to Ward, (2004), most often focuses on increasing coping skills, and interpersonal affinity skills. This paper will discuss a few of these disorders, such as Antisocial Personality, Borderline Personality disorders, and Insomnia.I will attempt to describe the various disorders and how they hit employer/employees in the workplace. We will look at the symptom logy observed by co-workers and/or supervisors for those with the different disorders. I will provide similarities and difference in how supervisors or co-workers would intervene with people with these disorders. The end result will be to provide appropriate organizational intervention s trategies for those living with these disorders. Antisocial Personality overturns (APD) match to (Babiak, and Hare. 2006).Personality disorder doings, is like a disease, is antiquity, and nothing ab bulge it changes. Antisocial personality disorder (APD) is one of the disorders describe in the Psychopath in the Workplace A Cautionary Tale, written by Paul Babiak and Robert D. Hare. The authors describe how a common misconception is that antisocial disorder refers to people who have poor social skills. On the contrary, the face-to-face is often the case, instead, APD is characterized by a lack of conscience people with this disorder are prone to criminal behavior, believing that their victims are weak and deserving of existence taken advantage of. Babiak, and Hare, 2006) Antisocial tend to lie and steal according to the authors. Often, they are careless with money and take action without thinking about consequences. They foot sometimes make up aggressive and are much more conc erned with their own needs then the needs of others. They may appear to be superior. Candidates for byplay leadership position and numerous of them rise to the positions of power and influence in business community. (p. 2) The authors express how a socially facile psychopath may expertly deceive the average person. Snakes in suits is the term the authors used to describe an antisocial person. (p. 2)They give descriptive lucid, richly detailed guide for corporate business professionals who are interested in understanding how important and often unrecognized behavior syndrome is acted out in the workplace. They believe this knowledge and information they give in their hold up Snakes in Suits When Psychopaths Go To Work is essential if socially responsible and ethical individuals are to protect themselves and their organization against ruthless, fraudulent, manipulative behavior. (P. 2. ) Its imperative that leaders and employees become aware and knowledgeable of this behavior if they are to protect themselves and their resources from exploitation. (Babiak, and Hare, 2006) These individual may appear impressive, because of their motivated ambitiousness, social charm, and self-confidence, yet closer observation of their behavior and review article of their motives reveals that they posses qualities of ruthless exploitations deceitfulness, pathological lying, and a wiliness to use antisocial and even criminal behavior to achieve their goals. Babiak, and Hare, 2006) check to Babiak, &Hare (2006) the symptoms that antisocial personality disorder discover, and should be observed by leaders, and employees are as followed Disregard for the feelings of others spontaneous and irresponsible decision-making Lack of remorse for harm done to others Lying, stealing, other criminal behavior Disregard for the safety of self and others Borderline Personality Disorders Borderline personality disorders are described by Babiak, & Hare,(2006), characterized by mood instabili ty and poor self-image.This disorder, according to the authors was named because it was originally thought to be at borderline of psychosis. The disorder is relatively common, affecting 2% of adults. Women are more likely to suffer borderline than men. roughly 20% of psychiatric hospitalizations are due to this disorder. (Babiak, and Hare 2006) People with this disorder are prone to having mood swings and or bouts of evoke. Often taking anger out on themselves, causing pain and injury to their own body. They are suicidal, and think in black and white terms, which often form intense, conflict-ridden relationships.They are quick to anger when their expectations are not met. The symptoms that employers/employees may observe are Self-injury or attempted suicide Strong feelings of anger, anxiety or depression that last for several hours Impulsive behavior Drugs or alcohol abuse Feelings of low self-worth Unstable relationships with friends, family, and boyfriends/ girlfriends and co-wo rkers Treatment could involve therapy in which the patient learns to talk through his/her feelings rather than unleashing them in wasteful and self-defeating ways.Medication may be helpful, and treatment of any alcohol or substance abuse issued should be required. Insomnia We have looked at Antisocial Personality Disorder (APD), and Borderline Personality Disorder (BPD). However, now I would like to prevent Insomnia, a disorder that is profound and many people suffer everyday because of it. According to authors of Handbook of Mental Health, Insomnia in the workplace is characterized by many different behaviors. People who suffer from insomnia call into work more because they are sick more.Insomnia green goddess have a negative affects on the workplace, reducing the ability of affected employees to maintain adequate productivity and safety on the job, impairing their overall quality of life. (Thomas, and Hensen, 2002 p. 351) People who suffer from insomnia are slower to complete as signments and short attention spans. Some people even put themselves and co-workers into dangerous situation if they are driving or working heavy machinery. Treatments for insomnia is commonly bought at most grocery stores. Sleep aid like SleepyTime passel be purchased easy to help sleep.However, using medicine can cause addiction, and cover up whats really the problem. Psychological treatment can aid in getting to the root of the problem. (Thomas, & Henson, 2002 p. 358). Durand, & Barlow, (2010), created a cite of psychological treatments for insomnia, which are cognitive, guided imagery relaxation, graduated extension, paradoxical intention, and progressive relaxation. (Durand and Barlow, 2010, p 332) Leaders and employees who need to recognize the symptoms and behavior that an Insomniac may display Lateness Absent Sleeping on the jobPre occupied Unmotivated Bosses and co-workers who are aware of each other normal work habits can observe and offer intervention, and resources th at can help people with this disorder strive for effective treatment. (Thomas, & Henson , 2002, p. 363). Supervisory Intervention When considering intervention, Employee Assistance Programs (EAPs) maybe one of the more comprehensive means of addressing psychopath in the workplace. (Thomas, & Hensen, 2004). Organizational leadership can play a tremendous role in the implementation of treatment modalities in the workplace.The members of the Leadership should make as many attempts as needed and possible to maintain and environment with minimal stressors. Leaders and organizations that have the holistic well-being of everyone involved, should implement healthy, well being programs, that are designed to improve productivity for everyone involved. Supervisors must observe, and realize the impact of unhealthy behavior to the organization, like cost, law suits, accidents, violence, and decrease of production and increase in expenses due to sickness / work compensation.Supervisors need to f ocus and observe behavior respectful approach the situation, without alienating or making the person feel as if gossip or singling out is not the goal. Leaders need to be empathic, and genuinely concern with ones well-being excellent communication skills and being well informed could enhance the probability of the person with the disorder agree to intervention. EAP programs are designed to address a multitude of issues that plague the workplace. The programs and find alternative resolution, to help elevate stresses that prevent productivity.Furthermore, employees have an obligation to themselves, as well as their employers. Telling someone that a problem exists could save time, money, and mental illnesses. Observing a fellow employee who is having difficulties should be account to supervisors, and not gossip about amongst fellow employees Subsequently, we all must become responsible for the healthy well-being of ourselves and find balance in our personal lives, in order to live st ress free and well- rounded.References 1) Durand V. M, & Barlow D. H. , (2010) Essential of Abnormal Psychology , Belmont, CA, Wadsworth, Census Learning 2) Hare, R. D, & Newman, C. S. (2006) , Handbook of Pschopathy , New York Gulford Press 3) Illinois Institute for Addiction Recovery, (2005-2009), invigilate Hospital 4) Thomas, J. , & Hensen, M. (2002), Handbook of Mental Health in the Workplace. Thousand Oak, CA Sage Publication. 5) Ward, K. R. (2004), American Family Physicians, Leawood.

Friday, May 24, 2019

Blood Imagery in Macbeth

Blood Imagery in Macbeth Imagine a war with step to the fore guns, missiles, or bombs. A war with swords, daggers, and arrows. A war with stock, gallons and gallons of kindred flooding the battlefields. Set in eleventh century Anglo-Saxon Scotland, this would be the typical battle scene in Shakespeares bloody tragedy, Macbeth. In Macbeth Shakespeare presents a bloody tale of an age-old struggle for power when Macbeth, the break aways protagonist, and his wife plan to kill Duncan, Scotlands current beloved king, after earreach a prophecy told by three evil witches proclaiming Macbeth to be the new king.The higher Macbeth rises to the thr wiz the deeper he slips into a bottomless pool of the blood of those who dared jump out in his way. Throughout Macbeth, Shakespeare uses images of blood as a means of symbolism, using multiple recurrences of blood imaginativeness to promote the primary feelings of fear, honor, and pain (Spurgeon 115). As a symbol blood ultimately covers everythin g Macbeth has touched in many ways both qualitative and quantitative that real blood is un sufficient to do (Mack 53).As the play progresses the symbolism changes and transforms from honor to betrayal and ultimately to guilt and penalise. Macbeth begins as a courageous hero in the midst of battle. A bloody man in King Duncans court tells a story of a bloody battle in which Macbeth fulfills the role of the hero (1. 2. 1). On the verge of bleeding out the Captain manages to paint Macbeths valor despite his blood flooding the Kings court (Character Profile 193). Images of the Captain, a man mortally wounded protecting Duncans son Malcolm in battle, smothered in his own blood gives a symbol of an honorable termination.While the Captain lay dying, he still goes on about Macbeth unseaming an opponent from the nave to th chops, building King Duncans trust in Macbeth (1. 2. 18-23). After the three witches visit Macbeth and Banquo, Macbeth tells his wife, skirt Macbeth, of the promises th e witches mentioned. auditory sense her husbands prophecy to be king, Lady Macbeth begins plotting the murder of the current reigning king, Duncan. She calls upon spirits to make thick her blood and stop the access and rush to remorse, so that she can murder Duncan without regret (1. . 44-45). Wishing her ability to regret her actions to be replaced with direst cruelty leaves Lady Macbeth believing that she and her husband will be able to kill Duncan with no remorse (1. 5. 44). While Macbeth contemplates his wifes treasonous plan, he sees a dagger before him covered in gouts of King Duncans blood (2. 1. 46). The blood and dagger are not real, though Macbeth believes they are, but instead they are a vision that Macbeth sees before the bloody business (2. 1. 48).These blood images convey a symbol of betrayal as well as treason. Murdering Duncan involves Macbeth betraying his trusting cousin and committing treason against Scotland. Immediately after Macbeth kills Duncan, he is rigid with execration at his blood- clouded manpower (Spurgeon 115). The endless red of the blood on his hands is all Macbeth can focus on (Campbell 130). Seeing the blood on his hands begins amplifying the guilt, sending him into shock, forcing Lady Macbeth to smear the grooms with blood (Campbell 130-131).Lady Macbeth plans to shift the light of guilt from her and her husband to the guards who were supposed to keep watch over the noble king. Using Duncans blood to gild the guards faces Lady Macbeth transforms blood into a physical symbol of guilt (2. 2. 55). Lennox, a Scottish nobleman, reports on the scene of Duncans death describing the guards faces to be badged with blood and their daggers unwiped (2. 3. 104-105). Because they are covered in the kings golden blood the alleged murderers are steeped in the colors of their trade (2. 3. 114-117).Bloody stains of the hands and hearts of Macbeth and his wife and the blood that covers the faces and weapons of the guards be adds a physical symbol of guilt. The guilt of Macbeth and Lady Macbeth is hidden from others while the guilt of the guards is create on their faces. Macbeth is fully aware that he is totally consumed by the blood of his murderous deeds. He states that his hands are stained with blood from the murder of Duncan. As the play progresses, the guilt of Macbeth multiplies as the amount of blood on his hands continues to grow, becoming a symbol of Macbeths guilt.Each death at the hands of Macbeth causes the stain of red to expand from his hands and spread all over him, from head to foot, symbolizing his growing guilt that becomes more inescapable (McElroy 46). As fourth dimension goes on after the murder, Lady Macbeth begins to slowly unravel into insanity. She is haunted by memories deeply etched in fear (Campbell 131). One of these memories is the scene of Duncans death she recalls the shock of the old to have had so much blood in him as well as the idea that her hands will never be clean (5. 1. 42-43 ).Walking in her sleep, Lady Macbeth finds a spot on her hand that she is unable to wash clean, a symbol of her eternal guilt. Bloody memories push Lady Macbeth into the waiting hands of insanity through the guilt that she feels. Images such as the blood upon her hands, and Duncan bleeding so much blood, feed Lady Macbeths guilt, causation it to continue to grow from guilt to deeply embedded fear, and finally to pure insanity (Campbell 132). With the murderous and wicked deed of the evil tyrant and his wife come plans of revenge and vengeance.Malcolm and Macduff, both having had horrid injustices done unto them, plan to take action to seize the throne from the wicked tyrant, Macbeth. With Malcolms fathers murder and the massacre of Macduffs family, the two men have burning passions for vengeance. In the country near Dunsinane, Scottish nobleman, Mentieth, tells that Malcolm and Macduff are coming to Scotland with Malcolms uncle Siward and the English powers. He explains that reven ge burns in both Malcolm and Macduff and that they come for revenge for Scotland, Duncan, and Macduffs family (5. . 2). The bloody deeds of Macbeth snub Malcolm and Macduff toward their goal of reclaiming Scotland. Malcolm describes the bloody state Macbeth has driven Scotland to as a country that sinks beneath the yoke (4. 3. 39). He claims Scotland weeps, bleeds and each new day a gash / Is added to her wounds (4. 3. 40-41). The personification of Scotland as a living being adds to the imagery of cuts and bloody gashes, upholding Malcolms need to avenge his fathers death and reclaim his fathers throne.The gruesome murder of Macduffs family provided him with the most native of motives for revenge and brought Macduff to the impersonal role of Scotlands avenger (Felperin 104). In the final act of Macbeth blood comes to symbolize a mean for revenge. It is the bloody acts of the evil Macbeth that drive the good men of Scotland to revolt against Macbeths rule, and ultimately in the re claiming of their homeland and the death of Macbeth at the hands of Macduff. The final scenes of Macbeth transform the symbol of blood to one of revenge.It is bloody acts that lead both Malcolm and Macduff to seek revenge against the tyrant along side the noble men of Scotland who wish to regain their homeland. ? Works Cited Campbell, Lily B. Macbeth A teach in Fear. Macbeth. Ed. Clarice Swisher. San Diego Greenhaven Press, Inc. , 1999. 126-135. Print. Character Profile. Macbeth. Ed. Harold Bloom. Philadelphia Chelsea House Publisher, 2005. 193-197. Print. Felperin, Howard. A Painted Devil Macbeth. William Shakespeares Macbeth. Ed. Harold Bloom. New York Chelsea House Publishers, 1987. 91-112. Print.Mack, Maynard. Literary and Political References in Macbeth. Macbeth. Ed. Clarice Swisher. San Diego Greenhaven Press, Inc. , 1999. 45-57. Print. McElroy, Bernard. Macbeth The Torture of the Mind. Macbeth. Ed. Harold Bloom. Philadelphia Chelsea House Publisher, 2005. 27-52. Pri nt. Shakespeare, William, and bucolic Barnet. The Tragedy of Macbeth. New York Signet Classic, 1998. Print. Spurgeon, Caroline F. E.. Shakespeares Imagery Heightens Emotions. Macbeth. Ed. Clarice Swisher. San Diego Greenhaven Press, Inc. , 1999. 107-117. Print. Word Count 1,223

Thursday, May 23, 2019

Nutrition Log Reflection

In addition to the lack of fats that I was consuming on twenty-four hours one, my milk intake was Daly rather low as well. Although, this TLD come quite as a surprise to me, because I tend to be lactose strict at times, and dont always necessarily lean towards foods containing dairy. However, since I have learned the importance of the vital nutrients found in dairy products such as calcium, potassium, Vitamin D, and protein, I have decided to take calcium supplements as a start.Also, I have decided to incorporate more lactose- free alternatives Into my diet such as low-fat cheese, and low-fat yogurt. In contrast to my seemingly deficient Intake of total fats on sidereal day one. I seemed to eve made up for my lack at that placeof by surpassing my recommended intake by 24. 6% on day two. Needless to say, that could not have been good for my health, considering that the majority of the fats ingested that day were the non-good ones. My intake of total calories from concentrated fat s was supposed to be less than 10%, I exceeded the recommendation by 3. 6%.In order to decrease the amounts of saturated fats that I consume from now on, I am going to choose foods with less or no saturated fat thereby military serviceing myself malting blood cholesterol levels within a natural range, and decreasing my risk for heart disease. In spite of all of the negative aspects of the foods that I had consumed during the three days of logging, I am happy to say that there were a few areas that I met the recommendations of. For example, on day three, my sodium intake was only (and I say only loosely) 1 882 MGM, even though the speed limit recommendation for me Is 2300 MGM.This was more of a personal triumph for me, considering that I am well aware of the fact that I only need ergocalciferol MGM of sodium a day to survive. Nevertheless, I always thought that I was consuming well above the upper limit recommendation, and was quite pleased with my findings regardless. In addition to my lower sodium consumption, I was also happy to discover that my diet was well under the recommended limit for cholesterol, not only on day three, but all of the days.In conclusion, I found that this assignment was highly beneficial not only for my health, but also because of the extra knowledge It helped me obtain to help me create and maintain a better lifestyle for myself. What stood out to me in particular were my fluctuations of total fat and saturated fat intakes. One of my goals is to try and contract a healthy balance of the two, and making sure that I include more of the DOD fats that help lower OLD cholesterol, and help raise HAD cholesterol.

Wednesday, May 22, 2019

Frank O’Conner: My Oedipus Complex

Everyone shows traces of the little green monster, kn have got as jealousy, but whatsoever more than others. This specific trait has had a huge effect on the world over time, sometimes destroying, sometimes rebuilding trust, friendships, and even business opportunities. green-eyed monster is an extremely prominent element in most of Frank OConnors authorships and is often shown through different literary concepts such as conflict, characterization, and obsessive love.In writing My Oedipus difficult, OConnor investigates the issue of jealousy through the various actions of his characters and the conflicts they get themselves tangled in, more importantly the ones involving their child similar obsessive love. To fully understand OConnors stories, you first establish to delve deep into his background. Frank OConnor was born in Cork, Ireland, on September 17, 1903 to Michael and Minnie ODonovan. He was born under the name of Michael ODonovan, but later created the anonym Frank OConn or that he would use for all of his writings (Gale).It was there in Cork that he experienced the horrors and distress of living in poverty. sluice when the family had a small amount of money, OConnors incur would regularly go aside on drinking sprees and return home violent and cruel (Gale). OConnor, creation the just now son, learned to help provide for his mother when his fathers priorities fell brusquesighted. OConnors education was minimal as he only attended formal school for a short period of time. Although, even after he couldnt afford it any longer, he continued to further his education by reading widely and often (Contemporary).Under the focussing and instruction of Daniel Corkey, OConnors biggest influence, he joined the Irish Republi bunghole Army. He fought against the British even after a treaty was signed ending the war in 1921 (Gale). OConnor was therefore arrested and imprisoned for his involvement in abiding the fight (Gale). During his time in prison, OCon nor continued to educate himself until his release in 1923 and formed many of the ideas that he would use in his future short stories. After he was released from prison in 1923, OConnor held various teaching posts at American Universities. He then went back to Ireland and worked as a librarian.Being a librarian and educator suited OConnor well because he could never put down a book and he was eager to share his knowledge with the rest of the world, especially the days y turn outh. OConnor continued to write and teach upon his return to Ireland and until his death, caused by a heart attack, on establish 10, 1966 in Dublin. Although there were many worldly issues happening at the time My Oedipus Complex was written, OConnor often chooses personal reminiscences over focusing on bigger, withstanding issues. no amour that can be identified as social or political to the highest degree My Oedipus Complex (Literature Resource Center).Many of OConnors other stories, however, were saturat ed with the conundrums of his time. In My Oedipus Complex, Larry is forced to face the circumstance that now that his father has returned from the war, Larry is no longer his mothers first priority. This goes on to include the Irish Republican Army in OConnors past. Also, World War I was fey on lightly. The first conflict in My Oedipus Complex is an extremely obvious one. The main conflict occurs between a young boy, Larry, and his father. For as long as Larry can remember, he has been living with only his mother because his father was a soldier in World War I (OConnor 337).While Larry was living with solely his mother, he was treated almost as an adult (OConnor 343). breed would often have long talks with her son in the mornings about the events that would occur later that day and what was running through her young childs head. When father returns home, it is pure chaos between him and his only son as the morning ritual is fitful and short becomes forgotten. It is all that Moth er can do to settle the constant bickering between her only son and her husband. It is impossible for her to choose a brass because they both have such significant roles in her life. military chaplain often treats Larry as if he were merely the child that he really is, while Larry, used to cosmos treated fairly in his own home, believes that he is much more mature than his father (OConnor 343). Larry was fully convinced that scram didnt deserve Mothers love and pith nearly as much as him, so naturally Larry did all that he could to prevent him from getting it. Larry felt that preceptor was too conceited for his own good and every time he spoke, bewilders words agitated Larry beyond belief (OConnor 346). In other words, he saw Father as a self-absorbed, immature fool (OConnor 340).These observations made Larry realize how much he hated Father at the time, but his attitude towards his father would soon change for the better. For the time being, Larry, as he was only five and not getting his own way, was full of spite as soon as Father got home. He even kicked Father a couple times the next morning so that he could lie in the bed next to Mother instead of Father (OConnor 344-345). This angered Father and flared up his reclusive anger towards his son. Father didnt want to let his son or his wife know that he was getting impatient, but Larry was starting to see that all his little annoyances were starting to add up.It was becoming more and more obvious to both Larry and his mother that Father was not at all pleased with Larrys actions. Larry would often catch Father glaring at him from the corner of his eye and referred to him as a mountain out for murder (OConnor 346). All the tension within the family was starting to affect everyone in the signhold. That settled it. Either Father or I would have to leave the house (OConnor 343). When the new baby (Sonny) is born, Father is thrown into the same position as Larry. Mother is suddenly ignoring not only Larry, but Father, too (OConnor 349).Father seeks solace in Larry, climbing into bed with him and complaining about Sonny, and the two of them bond this way. Finally, an understanding is reached. Father is sympathetic towards Larry now that he knows what his son has been through because he has been red through the exact same thing ever since Sonny was born. Father even ends up buying Larry an expensive train set for Christmas because now he understands how it feels to be forgotten in the midst of other people. The unique way that OConnor develops his characters has a prominent effect on the way he tells his story.Since Larry is the main character, he has the most divergent traits. He often expresses an astounding level of maturity, but after Father returns from the war, he often thinks about how there is a plenitude that he doesnt understand (OConnor 342). Larrys lack of understanding is most noticable when he thinks about how things were when it was just him and Mother at home and compa res it to how they are now that Father is back. Larry, being just a young boy, did not have very much patience or understanding for what was going on and he didnt like that Father was seemingly stealing Mother away from him (OConnor 342).Growing up, OConnor did not have a good relationship with his father, so he used that to adjunct this story in particular. In addition to growing up without a positive father figure OConnor had to take on a role of responsibility because of his fathers alcoholism. In My Oedipus Complex, Larry makes it clear that he feels that he is the more mature figure in his mothers life. I had been through it all myself, and even at that age I was grown (OConnor 349). Because of this, Larry also thinks that he is more deserving of his mothers attention, care, and love.The young boy viewed himself as responsible for his mothers health and did not like it when Father came home and Mother was distressed and pushed all the time (OConnor 339). Although Larry saw himself as older and wiser than he really was, he had a very rich imagination. In the mornings, before he went upstairs to his mothers room, Larry would let Mrs. Left and Mrs. Right, his feet, have various discussions regarding the days events (OConnor 338). When Father returned home, Mother became instantly anxious and no longer had time for their morning talks (Website).Her concern for Father was overpowering her love for her only son, which again, fits in well with OConnors background and childhood. Larry becomes extremely upset when he starts to think that his father has seemingly taken his smudge in his mothers life. When he notices that Mother is becoming overwhelmingly concerned for Father, Larry quickly realizes that he despises seeing Mother this way (Website). When Father had finally returned from the war, instead of celebrating like they should have, Mother became extremely worried about Fathers physical health (OConnor 339).She was also concerned about his mental health because of the trauma he had endured. Larry was upset about this for two reasons, the first being that he didnt like seeing his mother anxious and worried. When she was upset, so was he (Gale). The second reason was that Larry didnt like that thought that his father was seemingly replacing him as his mothers first priority. Because of all these tensions, Larry felt that he had to make sure that Father knew he wasnt just going to give up the fight. Larry was openly willing to fight against his father for Mothers affection (OConnor 347).He thought that Mother was with Father only because he was forcing her to be. With this in mind, Larry knew that he had to get Mother out of Fathers grasp. By doing this, Larry felt that he was rescuing his mother in a way (OConnor 347). Im going to marry you. I said quietly to Mother (OConnor 347). In his many short stories, specifically My Oedipus Complex, OConnor creates conflict, a lugubrious family, and distinct character traits to interpret the theme of jealousy into the plot of his story.He also uses those three concepts as an insight to his background and childhood. flat though OConnor doesnt have very many cultural influences over his writings, he makes sure that there are some working forces behind them. The only thing that differentiates OConnors writings from any other authors writings is that instead of have cultural influences, OConnor has personal influences. He often uses his own life as a supplement to his fictional stories. OConnor does a wonderful job of piecing together the small parts of his mind and connecting them into his writings.

Tuesday, May 21, 2019

Informatic Practile Grade 11 Cbse .

A Text Book on information science PRACTICES CLASS XI Shiksha Kendra, 2, conjunction Centre, Preet Vihar, Delhi-110 092 India A text book on Informatics Practices, Class XI. PRICE Rs. FIRST EDITION 2010 CBSE, India COPIES This book or part thereof may not be reproduced by any person or agency in any manner. PUBLISHED BY The Secretary, Central Board of Secondary Education, Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 DESIGN, LAYOUT Multi Graphics, 5745/81, Reghar Pura, Karol Bagh, impudently Delhi-110005, Phvirtuoso 25783846 PRINTED BY ii ForewordInformation and Communication Technology has permeated in every walk of life affecting the technology fields such(prenominal) as launching satellites, managing businesses across the globe and also enabling social net playacting. The convergence of computer, communication and content technologies, being known as ICT, encounter attracted t coating of academia, business, government and communities to use it for innov ative profi defer propositions. Year by year it is becoming simpler to use devices such as desktop, palm top, iPod, etc. 21st hundred is characterized with the emergence of knowledge establish society wherein ICT plays a pivotal role.In its vision, the National Policy on ICT in School Education by MHRD, Govt. of India, states The ICT policy in School Education aims at preparing youth to participate creatively in the establishment, sustenance and g gradeth of a knowledge society leading to each around socio economic burstment of the nation and global competitiveness. The policy envisages three stages of ICT implementations at school level ICT literacy and Competency Enhancement, ICT enabled teachinglearning, and introduction of ICT related nonappointive subjects at Senior Secondary level.With this backdrop a major paradigm shift is imperative in imparting ICT-enabled instructions, collaborative learning, multidisciplinary problem-solving and promoting critical thinking skills as envisaged in the National curriculum framework 2005. Foundation of these skills is laid at school level. Armed with such skills it is expected that a student will translate knowledge into easy to use systems to the ultimate benefit of the society at large.Syllabus of Informatics Practices has been revisited accordingly with a focus on generic concepts with macrocosm specific practical experiments and projects to ensure conceptual knowledge with practical skills. The societal impact of ICT nominate been discussed. A naked Unit on IT Applications has been added to enhance misgiving of the preceding(prenominal) tools and techniques to solve real life problems by designing both front end and back end with proper information connectivity. Introduction of propagate Standards and Open Source to promote Vendor Neutrality of tools.Creativity and Collaborative Learning/Programming is also an added feature. Specific entirelyy, a Unit on Ne 2rking and Open Standards is introduced in pl ace of Business Computing. For IDE based programming, Java is introduced in place of VB. Relational Database trouble System is dealt with using My SQL in place of SQL & PL/SQL using Oracle. The CBSE had been recommending different books in the past. With a total overhauling of the course on Informatics Practices it has ventured to bring out a comprehensive text book for all units for the startle time.I am happy to release Part-1 of Informatics Practices for Class XI. I would like to express my deep appreciation to the text book development team for their contribution and to the convener of the team, Prof. Om Vikas who competently steered this activity. Appreciation is also due to Mrs. C Gurumurthy, Director (Academic) and Dr. (Smt) Srijata Das, Education Officer, for planning, coordinating and executing this initiative and bringing out this publication. It is hoped that all students and teachers will benefit by making best use of this publication.Their feedback will be highly appreciated for further improvement. VINEET JOSHI CHAIRMAN H l d d H d d x , H d H l lt l h d T d x l x d d l L d l td d d t p D l H l d h L l d h l d , d, l D d d h x d h , d l p d h 100 ASkills100 GK100) JOptionPane. showMessageDialog(this,Re-Enter tag (Out of 100)) v if the label input by the drug user for any of the subjects argon greater than 100 Check or not an if they are then(prenominal) viewing the message Re-Enter attach (Out of 100). Since we puddle to march the error message if the tag of even one subject are out of limit so we have utilise the floozy which heart and soul OR.So in simple side it means if attach of English are 100 or tag of ASkills 100 or marks of GK 100, then reveal the error message. So the message will be displayed even if only one condition measures to true. if (ASkills=90 && GK=90 ) JOptionPane. showMessageDialog(this,** Selected for Achievers pillage **) jText bailiwick6. come inText(*) 158 information processing PRACTICES Chapt er-6 restrain Structures v if the marks of ASkills and GK are both = 90 or not. If they are then Check display the message ** Selected for Achievers Award ** and also display a * in the text field.Since we have to check that both the marks should be greater than 90 so we have use the && operator which in simple English means AND. So the condition will evaluate to true only if both the conditions are satisfied. Let us now write the code for the var. calculator application as shown in conjure up 6. 38 unavowed void jButton1ActionPer organize(java. awt. event. ActionEvent evt) // Variable Declaration and assignment operations int Total,English,ASkills,GK English=Integer. parseInt(jTextField1. getText()) ASkills=Integer. parseInt(jTextField2. getText()) GK=Integer. arseInt(jTextField3. getText()) //Validation of Entered Marks if (English100 ASkills100 GK100) JOptionPane. showMessageDialog (this,Re-Enter Marks (Out of 100)) else Total=English+ASkills+GK jTextField4. siteText(In teger. toString(Total)) jButton2. setEnabled(true) private void jButton2ActionPerformed(java. awt. event. ActionEvent evt) // Variable Declaration and assignment operations char Grade int ASkills,GK,Total ASkills=Integer. parseInt(jTextField2. getText()) GK=Integer. parseInt(jTextField3. getText()) Total=Integer. arseInt(jTextField1. getText()) information processing PRACTICES 159 Chapter-6 Control Structures //Decision for Achievers Award if (ASkills=90 && GK=90 ) JOptionPane. showMessageDialog (this,** Selected for Achievers Award **) jTextField6. setText(*) //Finding Grade if (Total=80) jTextField5. setText(A) else if (Total=70) jTextField5. setText(B) else if (Total=60) jTextField5. setText(C) else if (Total=50) jTextField5. setText(D) else jTextField5. setText(E) private void jButton3ActionPerformed(java. awt. event.ActionEvent evt) // To Exit from application System. exit(0) Figure 6. 38 Code for the Grade Calculator Application Since in this application we had to test for four-fold conditions in a if narration, so we had to join the conditions using some operators. Such conditions that are formed by joining simple conditions are called complex conditions and they are usually joined using the logical operators. crystal clear Operator A logical operator denotes a logical operation. Logical operators and relational operators are utilize together to form a complex condition. Logical operators are 160 informatics PRACTICES Chapter-6 Control Structures Operator && Use a10 && b10 bMySQL Command Line Client OR Goto the folder CProgram FilesMySQLMySQL Server 5. 1in as the drive having MySQL And Click on the file cabinet MySQL. EXE MySQL will prompt a message to provide password (it requires the same password which was entered during the installation) Enter Password**** meet to the MySQL monitor. Commands end with or g. Your MySQL connection id is 4 Server version (GPL) 5. 0. 51a-community-nt MySQL Community Edition Assuming C drive Type help o r h for help.Type c to trig the buffer. Mysql To exit from MySQL, type QUIT or EXIT MysqlQUIT The above steps ensure successful installation and configuration of MySQL informationbase server. Next time in the MySQL prompt, one female genital organ occasion and use informationbases, stool boards and execute SQL queries. Downloading MySQL Linux Environment Installation of the binary version of MySQL, release 4. 0. 20, to run on Linux is as follows Installation file for MySQL may be downloaded from the link information science PRACTICES 203 Chapter-8 Introduction to MySQL http//dev. mysql. com/downloads/mysql/5. 1. tmldownloads (Choose appropriate download link as per the desired operating system) Create MySQL User Account cd /usr/local groupadd mysql useradd -c MySQL Software Owner -g mysql mysql passwd mysql Changing password for user mysql. password all authentication tokens updated successfully. Installing Binary Version Unzip the files and change the directory to mysql cd mysql scripts/mysql_install_db user=mysql Preparing db dining turn off Preparing host defer Preparing user accede Preparing func circuit board The latest information about MySQL is available on the web at http//www. ysql. com Support MySQL by buying support/licenses at https// fix up. mysql. com 204 INFORMATICS PRACTICES Chapter-8 Introduction to MySQL Start and Stop The Database Software Starting the MySQL Database su cd /usr/local/mysql bin/mysqld_safe user=mysql & Starting mysqld daemon with databases from /usr/local/mysql/data Stopping the MySQL Database su cd /usr/local/mysql bin/mysqladmin -u root shutdown 040803 233627 mysqld ended 1+ through with(p) Know more Visit the undermentioned website to find a vast number of free and open source softwares available http//en. wikipedia. rg/wiki/List_of_free_and_open_source_software_packages bin/mysqld_safe user=mysql summary A database is an organised collection of data. v Data vis investment trustd in a relati onal database in one or more eludes. A group v of languages and pillars forms a dodge. The horizontal subset of a Table is known as a Row/Tuple. v The vertical subset of a Table is known as a wisespaper column/Attribute. v A medical prognosis key is an attribute (or a set of attributes) that alone(p)ly identifies a v form. A Primary Key is one of the gougedidate keys. Only v one of the Candidate keys is strikeed as the first key of a table. All some other keisterdidate keys are called Alternate keys.INFORMATICS PRACTICES 205 Chapter-8 Introduction to MySQL Multiple Choice Questions 1. A relation can have only one ________ key and may have more than one _______ keys. a) b) c) d) 2. Primary, Candidate Candidate, Alternate Candidate, Primary Alternate, Candidate The vertical subset of a table is known as a) b) c) d) Tuple Row Attribute Relation 3. If software is released under open source, it means a) b) c) d) It is expensive. Its source code is available to the user. It belongs to a company. It is a DBMS. 4. Which of the quest columns in a schoolchild table can be utilize as the primary key? ) b) c) d) Class Section First Name Admission No 5. A tuple is also known as a ___________________________ . a) b) c) d) table relation row field INFORMATICS PRACTICES 206 Chapter-8 Introduction to MySQL 6. An attribute is also known as a_________________________. a) b) c) d) table relation row column 7. A field or a combination of fields in a table that has a unique care for for each row is called a) b) c) d) Candidate key. Foreign key. Main key. Alternate key. Exercises 1. firmness of dissolve the following questions a) Define the following terms i) ii) Database Table iii) Primary key iv) v) b) c) d) e) f) 2. Candidate key Alternate keyWhat is the relationship between a Database and a Table? What is DBMS? Write names of any two DBMSs. How is data organized in a table? What is a Primary key? What is its purpose in a table? What is MySQL? Distinguish bet ween the following pairs a) b) Row and Column Primary key and Candidate key. INFORMATICS PRACTICES 207 9 Learning Objectives after(prenominal) studying this lesson the students will be able to State vcategories of SQL controversys. Create v a database Create v a table. Add rows to a table. v MySQL witness v data in various courses from table using necessitate avowal. Display v data in a sorted way using ORDER BY article.Modify v data stored in a table. View v structure of a table Modify v structure of table Delete v rows from a table In the previous lesson, you have learnt that Relational Databases use tables to store data. A table apparently refers to a two dimensional personifyation of data using columns and rows. MySQL lets us manipulate and manage these tables in an efficient way. We have learnt that MySQL is a Relational Database Management System. In this lesson we will learn about SQL (Structured question Language). It is a Standard language use for accessing and man ipulating relational databases. Ms.Sujata is a Class teacher of Class XI. She requisites to store data of her students i. e. Names and marks secured, in a database. A database is employ to house data in the form of tables. She uses a have DATABASE story to create a new database named School. 208 INFORMATICS PRACTICES Chapter-9 MySQL mysql CREATE DATABASE School Once the above mentioned bidding gets executed, a database with the name School is created on her system. Now she has to open the database to work on it. For this USE statement is required. She opens the School database Statement entered by user mysql USE School Database ChangedDisplay by system Now, MySQL prompt can take on any query related to the database School. Semicolon is standard way to end SQL statement. Creating a table After creating a database, the next step is creation of tables in the database. For this CREATE TABLE statement is used. Syntax CREATE TABLE ( , , , ) Since Ms. Sujata is just learning, she in itially creates a simple table named Learner with only two columns RollNo and Name in the School database. To do this, she enters the following statement mysql CREATE TABLE Learner ( RollNo integer, Name VARCHAR(25) ) INFORMATICS PRACTICES 209 Chapter-9 MySQL v Give meaningful name to a table. If a table will store information about students, name it STUDENTS, not Abc or Person. vnames and column names are not case sensitive. For example, Table STUDENTS is treated the same as STuDents or students. We will study about the CREATE TABLE statement in detail later in this lesson. What if Ms. Sujata wants to chequer the names of all the tables in the database? At any point of time, she can view names of all the tables contained in the current database by using doom TABLES statement as shown below mysql SHOW TABLES ++ Tables_in_school ++ Learner + 1 row in set (0. 00 sec) Once the table named Learner is created, Ms. Sujata would like to add data of students in the table, which is al so known as populating table with rows. To add row(s) in the table she uses the install INTO statement Syntax accede INTO set (,, ,) 210 INFORMATICS PRACTICES Chapter-9 MySQL She inserts 4 rows mysql INSERT INTO Learner determine (14,Aruna Asaf Ali) mysql INSERT INTO Learner VALUES (12,Tarun Sinha) mysql INSERT INTO Learner VALUES (16,John Fedrick) mysql INSERT INTO Learner VALUES (10,Yogi Raj Desai) In INSERT statement Character, date and Time data should be enclosed in Quotes. Numeric set should not be enclosed in quotes. Now that she has added 4 rows in the table, she wants to view the contents of the table. How can she do that? To view the contents of the table, she uses the following exact statement. In the simplest way, withdraw statement is used like this Syntax recognise * FROM So, she types the statement mysql rent * FROM Learner ++ RollNo Name ++ 14 12 16 10 Aruna Asaf Ali Tarun Sinha John Fedrick Yogi Raj Desai + In the above statement, FROM claus e states which table to look in for data. Any time to know the database currently in use, the SELECT DATABASE() statement can be used. INFORMATICS PRACTICES 211 Chapter-9 MySQL mysql SELECT DATABASE() DATABASE() school 1 row in set (0. 0 sec) Statements in MySQL are not case sensitive. It means select DATABASE() or SELECT DATABASE() or SELECT database() would all work the same way. Some Terminologies Keyword A keyword refers to a special word that has a special meaning to SQL. For example, SELECT and FROM are keywords.Clause A clause is a wad of an SQL statement. Each clause is identified by a keyword. For example, consider the statement SELECT name FROM Learner Here SELECT name is a clause. SELECT is a statement as well as a clause. SELECT clause is everything from keyword SELECT until keyword FROM. SELECT statement is the entire command. FROM Learner is a FROM clause, which specifies the table from which data has to be selected. Statement A statement is a combination of two or more clauses. For example, SELECT name FROM Learner is a statement. 212 INFORMATICS PRACTICES Chapter-9 MySQLMySQL Data Types Well, before we learn more about making a table, there is one thing we need to understand first Data Types. They exhibit the type of data that you are storing in a stipulation table column. So, what are the different Data Types available in MySQL? Here is a list of some of the most common ones and what type of determine they hold Class Text Data Type CHAR(size) Description A fixed-length get from 1 to 255 characters in length right-padded with spaces to the specify length when stored. Values must be enclosed in single quotes or double quotes. typeface Maths TexT VARCHAR(size)A variable-length suck from 1 to 255 characters in length for example VARCHAR(25). Values must be enclosed in single quotes or double quotes. Computer Me and u Numeric DECIMAL(size,d) It can represent number with or without the fractional part. The maximum number of digits may be specified in the size parameter. The maximum number of digits to the right of the quantitative point is specified in the d parameter INT Or INTEGER It is used for storing integer values. You can specify a width upto 11 digits. 17. 32 345 76 INFORMATICS PRACTICES 213 Chapter-9 MySQL Date DATE It represents the date including day, month and year It represents time.Format HHMMSS Note The supported range is from -8385959 to 8385959 2009-0702 judgment of conviction() TIME Categories of SQL Commands SQL commands can be classified into the following categories 1. Data Definition Language (DDL) Commands The DDL part of SQL permits database tables to be created or deleted. It also defines indices (keys), specifies links between tables, and imposes constraints on tables. object lessons of DDL commands in SQL are v CREATE DATABASE creates a new database v CREATE TABLE creates a new table v TABLE modifies a table transmute v TABLE deletes a table drib 2. The Data Manipulation Language (DML) CommandsThe query and update commands form the DML part of SQL Examples of DDL commands are v SELECT extracts data from a table v UPDATE updates data in a table v strike down deletes data from a table v INSERT INTO inserts new data into a table CREATE TABLE Ms. Sujata feels good that she has successfully created a table named Learner with 2 columns using CREATE TABLE statement. She now creates a table named disciple with 214 INFORMATICS PRACTICES Chapter-9 MySQL four columns. When tables are created its columns are named, data types and sizes are supplied for each column. While creating a table at least one column must be specified.Syntax CREATE TABLE ( column name , ( column name , ) Example mysql USE school Database changed mysql CREATE TABLE learner( Rollno INTEGER, Name VARCHAR(25), gender CHAR(1), Marks1 DECIMAL(4,1)) Query OK, 0 rows affect (0. 16 sec) If table scholar already exists in database school, then the error message Table savant already exists is displayed. Each column in the table is given a unique name. In the example above the column names are Rollno, Name etc. This doesnt mean each column that is named has to be unique within the entire database.It only has to be unique within the table where it exists. Also notice that the names do not use any spaces. When naming tables and columns be sure to keep it simple with earn and numbers. Spaces and images are invalid characters except for underscore(_). Column names like first_name,last_name,email are valid column names. Viewing Structure of Table The DESCRIBE statement can be used to wait the structure of a table as indicated in the Create Statement. It displays the Column names, their data types, whether Column must contain data ,whether the Column is a Primary key etc.INFORMATICS PRACTICES 215 Chapter-9 MySQL Syntax DESCRIBE OR DESC mysql DESCRIBE Student Statement entered by user ++++++-+ Field Type bootless Key Default Extra ++++++-+ Rollno int(11) Name va rchar(25) YES YES YES unreal NULL NULL NULL Output shown by system Gender char(1) Marks1 decimal(4,1) YES ++++++-+ 4 rows in set (0. 01 sec) Ms.Sujata adds some rows in the Student table using the INSERT INTO statement INSERT INTO Student VALUES (1,Siddharth Sehgal,M,93) INSERT INTO Student VALUES (2,Gurpreet Kaur,F,91) INSERT INTO Student VALUES (3,Monica genus Rana,F,93) INSERT INTO Student VALUES (4,Jatinder Sen,M,78) INSERT INTO Student VALUES (5,George Jacob,M,76) INSERT INTO Student VALUES (6,Deepa Bhandari,F,77) INSERT INTO Student VALUES (7,Akshay Nath,M,65) Changing Structure of table When we create a table we define its structure. We can also change its structure i. e. add, remove or change its column(s) using the ALTER TABLE statement.Syntax ALTER TABLE ADD/DROP datatype ALTER TABLE MODIFY 216 INFORMATICS PRACTICES Chapter-9 MySQL Example Ms. Sujata adds a column named Games. mysql ALTER TABLE Student ADD Games VARCHAR(20) Now she wants to check the structure of the table to see that the new column Games is added. mysql DESCRIBE Student ++++++-+ Field Type Null Key Default Extra ++++++-+ Rollno int(11) Name varchar(25) YES YES YES NULL NULL NULL NULL NULL Gender char(1) Marks1 decimal(4,1) YES Games varchar(20) YES ++++++-+ 5 rows in set (0. 00 sec) After slaying of the above ALTER TABLE statement, the Games column is added and a NULL value is assigned to all the rows in this column. mysql SELECT * FROM Student +++++-+ Rollno Name 1 Siddharth Sehgal 2 Gurpreet Kaur 3 Monica Rana 4 Jatinder Sen 5 George Jacob 6 Deepa Bhandari 7 Akshay Nath Gender Marks1 M F F M M F M 93. 91. 0 93. 0 78. 0 76. 0 77. 0 65. 0 Games NULL NULL NULL NULL NULL NULL NULL +++++-+ +++++-+ INFORMATICS PRACTICES 217 Chapter-9 MySQL Now, suppose we want to change the newly added Games column to hold integers(in place of character data) using ALTER TABLE statement mysql ALTE R TABLE Student MODIFY games INTEGER To delete a column of a table the ALTER TABLE statement is used with Drop clause. Ms.Sujata deletes the Games column using the ALTER TABLE statement mysql ALTER TABLE Student DROP Games mysql DESC student ++++++-+ Field Type Null Key Default Extra ++++++-+ Rollno int(11) Name varchar(25) YES YES YES NULL NULL NULL NULL Gender char(1) Marks1 decimal(4,1) YES ++++++-+ 4 rows in set (0. 00 sec) The above display shows that Games column is removed from the table. The word DESC can also be used in place of DESCRIBE Retrieving Information with SELECT Statement The SELECT statement is used to fetch data from one or more database tables. Retrieving Single Column Here is the syntax of SELECT statement to retrieve a single column from a table Syntax SELECT FROM 218 INFORMATICS PRACTICES Chapter-9 MySQL Example Ms. Sujata wants to display Roll numbers of all her students. She uses the following statement mysql SELECT Roll no FROM Student +- + Rollno +- + 1 2 3 4 5 6 7 - + 7 rows in set (0. 00 sec) Retrieving Multiple Columns We can display more than one column(s) from a table using SELECT statement Syntax SELECT , FROM Example Now, Ms. Sujata displays two columns Roll numbers and names of all the students. mysql SELECT Rollno, Name FROM Student +- ++ Rollno Name +- ++ 1 2 Siddharth Sehgal Gurpreet Kaur 219 INFORMATICS PRACTICES Chapter-9 MySQL 3 4 5 6 7 Monica Rana Jatinder Sen George Jacob Deepa Bhandari Akshay Nath +- ++ 7 rows in set (0. 00 sec) Changing the order of display of Columns We can display columns in any order by specifying the columns in that order in SELECT statement . The following statement displays Names first and then Roll numbers from the table Student. mysql SELECT Name,Rollno FROM Student +++ Name Rollno +++ Siddharth Sehgal Gurpreet Kaur Monica Rana Jatinder Sen George Jacob Deepa Bhandari Akshay Nath 1 2 3 4 5 6 7 ++ 7 rows in set (0. 00 sec) In the Output, notice that the first column displaying names is left-justified and the second column displaying roll numbers is right justified. The format of product follows the pattern that character data is left justified and numeral data is right justified. 220 INFORMATICS PRACTICES Chapter-9 MySQL Retrieving all Columns To see all the columns of the table, we can write * in place of names of all the columns. The columns are displayed in the order in which they are stored in the table. Ms.Sujata uses the following statement to see all the columns of her table mysql SELECT * FROM Student +++++ Rollno Name Gender Marks1 +++++ 1 2 3 4 5 6 7 Siddharth Sehgal Gurpreet Kaur Monica Rana Jatinder Sen George Jacob Deepa Bhandari Akshay Nath M F F M M F M 93. 0 91. 0 93. 0 78. 0 76. 0 77. 0 65. 0 +++++ 7 rows in set (0. 00 sec) The asterisk (*) means All.SELECT * means display all columns Eliminating couple values By sl ackness data is displayed from all the rows of the table, even if the data in the result is duplicated. Using the keyword DISTINCT, the duplicate values can be eliminated in the result. When DISTINCT keyword is specified, only one instance of the duplicated data is shown. The following query without the DISTINCT keyword shows 7 rows while the same query with DISTINCT keyword shows 6 rows as duplicate data 93 is displayed only once. INFORMATICS PRACTICES 221 Chapter-9 MySQL mysql SELECT Marks1 FROM Student ++ Marks1 ++ 93. 91. 0 93. 0 78. 0 76. 0 77. 0 65. 0 93 displayed twice ++ 7 rows in set (0. 00 sec) mysql SELECT DISTINCT Marks1 FROM Student ++ Marks1 ++ 93. 0 91. 0 78. 0 76. 0 77. 0 65. 0 ++ 6 rows in set (0. 00 sec) 222 INFORMATICS PRACTICES Chapter-9 MySQL Retrieving Data From All Rows If we write the keyword ALL in place of DISTINCT, then the result of SELECT query displays all the values including duplicate values. The end product is the same as what we get when we do not write DISTINCT keyword in the SELECT query.Using Arithmetic Operators with SELECT Arithmetic operators answer mathematical calculations. In SQL the following arithmetic operators are used Operator + * / % What it does Addition Subtraction Multiplication Division Modulus (or remainder) Modulus operator (%) returns the remainder of a division. We can perform simple arithmetic computations on data using SELECT statement. Ms. Sujata thinks what if all my students had secured 5 marks more. She enters the following statement to display marks of all students increase by 5. mysql SELECT Marks1+5 FROM Student +-+ Marks1+5 +-+ 98. 96. 0 98. 0 83. 0 81. 0 82. 0 70. 0 +-+ 7 rows in set (0. 02 sec) INFORMATICS PRACTICES 223 Chapter-9 MySQL Marks1 column is displayed increased by 5. The actual values are not increased in the table. Here are some more examples mysql SELECT Name,Marks1+0. 05*Marks1 FROM Student mysql SELECT Name,Marks1-10 FROM Studen t mysql SELECT Name,Marks1/2 FROM Student Using these operators on tables does not create new columns in the tables or change the actual data values. The results of the calculations appear only in the output.In the above examples, arithmetic calculations were based on Student table. Arithmetic calculations may not always be based on tables. For example when we want to compute 7*3+1, there is no table to be referenced. In such queries no FROM clause is used mysql SELECT 7*3+1 +-+ 7*3+1 +-+ 22 +-+ 1 row in set (0. 09 sec) mysql SELECT 71+34 +-+ 71+34 +-+ 105 +-+ 1 row in set (0. 00 sec) 224 INFORMATICS PRACTICES Chapter-9 MySQL Using Column Alias Till now, we have seen that when the result of an SQL statement is displayed, the heading displayed at the top of column is same s the column name in the table or the arithmetic operation being through on the Column. While displaying marks from the table Student, Ms. Sujata wants the output to display a column heading (for Marks) that is easier to understand and is more meaningful and presentable like Marks Secured instead of Marks1. Column alias lets different name (heading) to appear for a column than the actual one in the output. She enters the statement like this mysql SELECT Marks1 AS Marks Secured FROM Student ++ Marks Secured ++ 93. 91. 0 93. 0 78. 0 76. 0 77. 0 65. 0 ++ 7 rows in set (0. 00 sec) Notice that the column Marks1 has been given the column heading Marks Secured . If a column alias consists of more than one word ,then it should be enclosed in quotes as in Marks Secured,otherwise error message is displayed. Using Column Alias does not rename a column. It simply displays a different column name in the output. The AS keyword between the column name and alias is optional. We can also write SELECT Marks1 Marks Secured FROM Student INFORMATICS PRACTICES 225Chapter-9 MySQL Putting text in Query output Can Ms. Sujata make the query output more presentable by inserting items such as symbols or text in the query output ? Yes. She can. She uses the following statement. mysql SELECT Rollno,Name,has secured marks,marks1 FROM student +++-++ Rollno Name has secured marks marks1 +++-++ 1 Siddharth Sehgal has secured marks 2 Gurpreet Kaur 3 Monica Rana 4 Jatinder Sen 5 George Jacob 6 Deepa Bhandari 7 Akshay Nath has secured marks has secured marks has secured marks has secured marks has secured marks has secured marks 93. 0 91. 0 93. 0 78. 0 76. 0 77. 0 65. 0 +++-++ 7 rows in set (0. 00 sec) The text has secured marks is displayed with every row of the table. Retrieving specific rows WHERE clause Tables usually contain many rows. Mostly, we do not want to display all the rows of a table. accepted rows can be displayed based on the criteria for selection of rows using the keyword WHERE. The WHERE clause is used to filter records. It is used to extract only those records that fulfill a specified criterion. Syntax SELECT , ,. FROM WHERE Ms. Sujata wants to display the names and marks of all those students who have secured marks above 80, she enters 226 INFORMATICS PRACTICES Chapter-9 MySQL mysql SELECT Name,Marks1 FROM Student WHERE Marks1 80 ++-+ Name Marks1 ++-+ Siddharth Sehgal Gurpreet Kaur Monica Rana 93. 91. 0 93. 0 ++-+ 3 rows in set (0. 00 sec) She thinks What would be the marks of my students if they were increased by 5 for all those students who secured marks below 80? She enters the statement mysql SELECT Name,Marks1+5 FROM Student WHERE marks1 = SELECT * FROM Student WHERE Marks1=93 +++++ Rollno Name Gender Marks1 +++++ 1 3 Siddharth Sehgal Monica Rana M F 93. 0 93. 0 +++++ 2 rows in set (0. 6 sec) When we use relational operators with character data type, means earlier in the alphabet and means later in the alphabet. Aman Ayan as m comes before y in alphabet. Some more examples of queries involving relational expressions mysql SELECT Name,Marks1 FROM Student WHER E Marks1 SELECT * FROM Student WHERE Name = Gurpreet Kaur mysql SELECT RollNo,Marks1 FROM Student WHERE Rollno SELECT RollNo,Marks1 FROM Student WHERE Rollno 3 mysql SELECT RollNo,Marks1 FROM Student WHERE Name Mani Kumar 228 INFORMATICS PRACTICESChapter-9 MySQL Logical Operators OR, AND, not logical operators are used in SQL. Logical operators OR and AND are used to connect relational expressions in the WHERE clause. If any of the comparisons are true, OR returns TRUE. AND requires both conditions to be true in order to return TRUE. NOT negates a condition. If a condition returns a True value, adding NOT causes the condition to return a False value and vice versa. The symbol can be used in place of OR, && can be used in place of AND, can be used in place of NOT operator. Ms.Sujata uses the following statement (with Logical operator AND) to display Roll numbers and names of students who have secured marks above 70 but below 80. mysql SELECT Rollno, Name,Marks1 FROM Student WHERE M arks1 70 AND Marks1 80 ++-++ Rollno Name Marks1 ++-++ 4 5 6 Jatinder Sen George Jacob Deepa Bhandari 78. 0 76. 0 77. 0 ++-++ 3 rows in set (0. 01 sec) Some example of SQL statements with Logical operators are shown below. ysql SELECT Empnumber, EmpName FROM Employee WHERE Department = Accoumts OR Department = Personnel mysql SELECT Empnumber, EmpName FROM Employee WHERE Department = Accoumts AND Designation = Manager mysql SELECT Empnumber, EmpName FROM Employee WHERE NOT(Designation = Manager) mysql SELECT Name,TotalMarks FROM Candidate WHERE writtenmarks80 Interviewmarks10 SELECT Name,TotalMarks FROM Candidate WHERE writtenmarks80 && Interviewmarks10 INFORMATICS PRACTICES 229 Chapter-9 MySQL Using Parenthesis in WHERE clause Sometimes we have to write a criterion using a combination of AND and OR.The parentheses not only help us visually see how things are grouped together but they also let the DBMS know exactly what to do. SELECT * FROM Emp WHERE first_name=Ami t AND (last_name=Sharma OR last_name=Verma) So, how does that work? It simply states that we are aspect for anyone with the first name as Amit and the last name as Sharma or Verma. They must have the first name as Amit but can have the last name as either Sharma or Verma. Condition based on Range The BETWEEN operator defines the range of values within which the column values must fall into to make the condition true. The range includes both the upper and lower values.Ms. Sujata uses the following statement to display roll numbers and marks of students who have secured marks in the range 70 to 80 (including 70 and 80). mysql SELECT Rollno,Name,Marks1 FROM Student WHERE Marks1 BETWEEN 70 AND 80 ++-++ Rollno Name Marks1 ++-++ 4 5 6 Jatinder Sen George Jacob Deepa Bhandari 78. 0 76. 0 77. 0 ++-++ 3 rows in set (0. 06 sec) The following statement displays roll numbers and marks of students who have secured marks other than the ones in the range 70 to 80(including 70 and 80). 30 INFORMATICS PRACTICES Chapter-9 MySQL mysql SELECT Rollno,Name,Marks1 FROM Student WHERE Marks1 NOT BETWEEN 70 AND 80 BETWEEN displays all values between the lower and the upper values including the lower and the upper values. To display marks in the range 70 to 80, Ms. Sujata could have used the following statement to give the same output as the one using BETWEEN operator. mysql SELECT Rollno,Name,Marks1 FROM Student WHERE Marks1=70 AND Marks1 SELECT Rollno, Name, Marks1 FROM Student WHERE Marks1 IN (68,76,78) +-+++ Rollno Name Marks1 -+++ 4 5 Jatinder Sen 78. 0 76. 0 George Jacob +-+++ 2 rows in set (0. 00 sec) In an Employee table, to display rows where State is DELHI or MUMBAI or UP, we write the query like this SELECT * FROM Employee WHERE State IN (DELHI,MUMBAI,UP) In an Employee table, to display all rows except those that have State as DELHI or MUMBAI or UP, we write the query like this INFORMATICS PRACTICES 231 Chapter-9 MySQL SELECT * FROM Employee WHE RE State NOT IN (DELHI,MUMBAI,UP) Till now Ms.Sujatas table Student has 7 rows. She wants to populate it with some more rows. She uses the following INSERT INTO statement. INSERT INTO Student VALUES (8,Samdisha Sen,F,76) INSERT INTO Student VALUES (9,Geeta Sen Sharma,F,91) INSERT INTO Student VALUES (10,Geet Kadamb,M,66) INSERT INTO Student VALUES (11,Aman Ali,M,92) INSERT INTO Student VALUES (12,Ayan Ali,M,87) She checks that the table has the new rows inserted by using the following SELECT statement SELECT * FROM Student +++++ Rollno name Gender Marks1 ++++ 1 2 3 4 5 6 7 8 9 10 11 12 Siddharth Sehgal Gurpreet Kaur Monica Rana Jatinder Sen George Jacob Deepa Bhandari Akshay Nath Samdisha Sen Geeta Sen Sharma Geet Kadamb Aman Ali Ayan Ali M F F M M F M F F M M M 93 91 93 78 76 77 65 76 91 66 92 87 +++++ 12 rows in set (0. 00 sec) 232 INFORMATICS PRACTICESChapter-9 MySQL Condition based on pattern matches Sometimes whil e trying to think about somebodys name, you remember a part of his/her name but not the exact name. In such cases, MySQL has wildcards to help you out. % and _ are two wild card characters. The percent (%) symbol is used to represent any sequence of zero or more characters. The underscore (_) symbol is used to represent a single character. LIKE clause is used to fetch data which matches the specified pattern from a table.The LIKE clause tells the DBMS that we wont be doing a strict comparison like = or or but we will be using wildcards in our comparison. Syntax SELECT , WHERE LIKE Pattern AND OR For example, Ms. Sujata wants to display details of students who have their names ending with Sen, she enters mysql SELECT * FROM Student WHERE Name LIKE %Sen ++++-+ Rollno Name Gender Marks1 ++++-+ 4 Jatinder Sen M 8 Samdisha Sen F 78. 76. 0 ++++-+ 2 rows in set (0. 00 sec) To display rows from the table Student with names commencement with G, she enters mysql SELECT * FROM Student WHERE Name LIKE G% ++++-+ Rollno name Gender Marks1 ++++-+ 2 Gurpreet Kaur F 91. 0 233 INFORMATICS PRACTICES Chapter-9 MySQL 5 George Jacob 9 Geeta Sen Sharma 10 Geet Kadamb M F M 76. 0 91. 66. 0 ++++-+ 4 rows in set (0. 02 sec) To display rows that have names starting with G and ending with b, she enters mysql SELECT * FROM Student WHERE Name LIKE G%b +-++-++ Rollno name Gender Marks1 +-++-++ 5 10 George Jacob Geet Kadamb M M 76. 0 66. 0 +-++-++ 2 rows in set (0. 0 sec) To display rows from the table Student that have Sen anywhere in their names, she enters mysql SELECT * FROM Student WHERE Name LIKE %Sen% +-++-++ Rollno name Gender Marks1 +-++-++ 4 8 9 Jatinder Sen Samdisha Sen Geeta Sen Sharma M F F 78 76 91 +-++-++ 3 rows in set (0. 00 sec) 234 INFORMATICS PRACTICES Chapter-9 MySQLTo display rows that have names starting with A and then having any 4 characters and ending with Ali, she uses underscore wild card like this mysql SELECT * FROM Student WHERE Name LIKE A_ _ _ _ Ali +-++-++ Rollno name Gender Marks1 +-++-++ 11 12 Aman Ali Ayan Ali M M 92. 0 87. 0 +-++-++ 2 rows in set (0. 00 sec) Some more examples Am% matches any string starting with Am. %Singh% matches any string containing Singh %a matches any string ending with a _ _ _ matches any string that is exactly 3 characters long. _ _ % matches any string that has at least 2 characters. _ _ _ g matches any string that is 4 characters long with any 3 characters in the beginning but g as the 4th character. The keyword NOT LIKE is used to select the rows that do not match the specified pattern. To display rows from the table Student that have names not starting with G, she enters mysql SELECT * FROM Student WHERE Name NOT LIKE G% Precedence of Operators All the operators have precedence.Precedence is the order in which different operators are evaluated in the same expression. When evaluating an expression containing INFORMATICS PRACTICES 235 Chapter-9 MySQL multiple operators, operators with higher precedence are evaluated before evaluating those with lower precedence. Operators with equal precedence are evaluated from left to right within the expression. Parenthesis can be used to change the preference of an operator. Various operators in locomote order of precedence (top to bottom) are listed below (unary minus) *, /, DIV, %, MOD -, + =, , =, , INSERT INTO Student(Rollno,Marks1) VALUES (14,45) Query OK, 1 row abnormal (0. 05 sec) Since values are provided only for Roll number and marks, Ms. Sujata uses the SELECT statement and notices the word NULL displayed for Name and Gender for Roll number 14 mysql SELECT * FROM Student WHERE Rollno =14 ++++-+ Rollno name Gender Marks1 ++++-+ 14 NULL NULL 45. 0 ++++-+ 1 row in set (0. 0 sec) explicitly Inserting NULL Values We have learnt that if a column can hold NULL values, it can be omitted from the INSERT INTO statement. INSERT INTO statement will mechanically insert a null value in that column. This is called Implicitly inserting a NULL value. mysql INSERT INTO Student(Rollno,Name,Gender) Values(15,Charvi Chanana,F) Query OK, 1 row affected (0. 11 sec) In the above INSERT INTO statement Marks1 column is omitted, therefore NULL value will be inserted for it. We can also explicitly add NULL value by using the NULL keyword in the VALUES list for those columns that can hold null values. ysql INSERT INTO Student Values(14,Siddharth Sehgal,M,NULL) Query OK, 1 row affected (0. 11 sec) 242 INFORMATICS PRACTICES Chapter-9 MySQL A NULL value means no value has been entered for that column i. e. the value for that column is not known. Inserting Date Values The default way to store a date in MySQL is with the type DATE. Below is the format of a DATE. YYYY-MM-DD To insert the current date into a table, MySQLs built-in go away CURDATE() can be used in the query. Following are some examples of inserting date values. ysql INSERT INTO my_ table (idate) VALUES (19970505) mysql INSERT INTO my_table (idate) VALUES (97-05-05) mysql INSERT INTO my_table (idate) VALUES (1997. 05. 05) mysql INSERT INTO my_table (idate) VALUES (0000-00-00) While Inserting data v Text values must be enclosed in quotes. v Standard date format is yyyy-mm-dd. v Standard time format is hhmmss. v are required around the standard date and time formats. Quotes UPDATE STATEMENT In the table student, Ms. Sujata entered a students marks as 93.Suppose, that student found out that one of her answers was unchecked and got her marks increased by 1. How would Ms. Sujata change it in the table? She can use the UPDATE statement to modify existing data in the table. (a) Syntax UPDATE club = , = , WHERE INFORMATICS PRACTICES 243 Chapter-9 MySQL The statement can be used to update one or more columns together. WHERE clause helps in updation of particular rows in a table. The following statement sets the marks(Mark1) of all the rows to 94. UPDATE Student SET Marks1 = 94 The following statement sets the marks(Mark1) of the row with name as Monica Rana to 94. ysql UPDATE Student SET Marks1 = 94 WHERE name = Monica Rana Query OK, 1 row affected (0. 03 sec) Rows matched 1 Changed 1 Warnings 0 The marks displayed from the table shows 94 marks now mysql SELECT Name,Marks1 FROM Student WHERE Name = Monica Rana Output +++ Name Marks1 +++ Monica Rana 94 +++ 1 row in set (0. 00 sec) What if Ms. Sujata wants to change the name and marks both at the same time? Multiple columns can also be updated at one time.The following statement changes the name to Chhavi Chanana and Marks to 90 for the roll number 15. mysql UPDATE Student SET name = Chhavi Marks1= 90 WHERE Rollno = 15 Output Query OK , 1 row affected (0. 8 sec) 244 INFORMATICS PRACTICES Chanana, Chapter-9 MySQL cancel STATEMENT Sometimes students leave school or an employee leaves an organization. Their rows have to be deleted from the table. Deleting data from a table is very simple. D ELETE statement is used to delete rows from a table. DELETE removes the entire row, not the individual column values.Care must be taken while using this statement as accidentally important data may get deleted. Syntax mysql DELETE FROM tablename Where condn One of the students with Roll number 14 has left the school and Ms. Sujata wants to delete his/her row. She uses the following statement to delete the row with roll number 14. mysql DELETE FROM Student WHERE Rollno = 14 Query OK, 1 row affected (0. 03 sec) DELETE statement can be used to delete all rows of the table also . The following statement can be used to delete all the rows from Student table. ysql DELETE from Student mysql Select * FROM Student ++++-+ Rollno Name Gender Marks1 ++++-+ ++++-+ 0 row in set (0. 01 sec) Know more The MySQL database management system contains an enormous amount of functionality and power. Using a simple set of statements for inserting, retrieving, deleting and updating data, we can develop quite a useful set of databases and tables. To learn more about MySQL you may visit the website http//www. mysqltutorial. org INFORMATICS PRACTICES 245 Chapter-9 MySQLSummary 1. 2. 3. 4. 5. 6. 7. 8. CREATE DATABASE statement is used to create a new database. CREATE TABLE statement is used to create a new table. INSERT INTO statement is used to insert a new row in a table. The SELECT statement is used to fetch data from one or more database tables. SELECT * means display all columns. The WHERE clause is used to select specific rows. The DESCRIBE statement is used to see the structure of a table. We can change the structure of a table ie. add, remove or change its column(s) using the ALTER TABLE statement. The keyword DISTINCT is used to eliminate redundant data from display. a) Logical operators OR and AND are used to connect relational expressions in the WHERE clause. Logical operator NOT is used to negate a condition. 9. 10. (b) 11. The BETWEEN operator defines the range of values that the column values must fall into to make the condition true. The IN operator selects values that match any value in the given list of values. % and _ are two wild card characters. The percent (%) symbol is used to represent any sequence of zero or more characters. The underscore (_) symbol is used to represent a single character. NULL represents a value that is unavailable, unassigned, unknown or inapplicable.The results of the SELECT statement can be displayed in the ascending or descending order of a single column or columns using ORDER BY clause. UPDATE statement is used to modify existing data in a table. DELETE statement is used to delete rows from a table. 12. 13. 14. 15. 16. 17. 246 INFORMATICS PRACTICES Chapter-9 MySQL Multiple Choice questions 1. Which statement is used to extract data from a table? A. B. C. D. 2. SELECT DISPLAY READ EXTRACT How do you select all the columns from a table named Employee? A. B. C. D. SELECT all FROM Employee SELECT Employee SELEC T * BY Employee SELECT * FROM Employee . How do you select a column named IName from a table named Inventory? A. B. C. D. SELECT Inventory FROM Iname DISPLAY Iname SELECT Iname FROM Inventory FROM Inventory SELECT Iname, Inventory FROM Iname 4. Which of the following are valid column names? A. B. C. D. Marks Eng 66_Marks Marks_Eng Eng_Marks 5. SELECT statement can be used to perform these functions. A. B. C. D. Insert rows into a table. Choose and display columns from a table. Modify data in a table. Select and display structure of a table INFORMATICS PRACTICES 247 Chapter-9 MySQL 6. Which statement is used to insert new data in a table?A. B. C. D. ADD RECORD INSERT RECORD INSERT INTO INSERT ROW 7. How would you display all those rows from a table named Friends where the value of the column Hobbies is SWIMMING A. B. C. D. SELECT ALL FROM Friends WHERE Hobbies IS SWIMMING SELECT * FROM Friends WHERE Hobbies=SWIMMING SELECT * FROM Friends WHERE Hobbies = Swimming SELECT ALL FROM Fri ends WHERE Hobbies SWIMMING 8. Which statement is used to modify data in a table? A. B. C. D. CHANGE MODIFY UPDATE SAVE AS 9. Which SQL statement is used to delete data from a table? A. B. C. D. DELETE DROP TRUNCATE REMOVE 10.How do you select all the rows from a table named Student where the value of the column FName starts with G? A. B. C. D. SELECT * FROM Student WHERE FName LIKE G_ SELECT * FROM Student WHERE FName=G SELECT * FROM Student WHERE FName LIKE G% SELECT * WHERE Student WHERE FName=%G% INFORMATICS PRACTICES 248 Chapter-9 MySQL 11. The OR operator displays a record if ANY of the conditions listed are true. The AND operator displays a record if ALL of the conditions listed are true A. B. False True 12. Which keyword is used to return only different values in a column? A. B. C. D. DIFFERENT EXCLUSIVE DISTINCT UNIQUE 3. Which SQL keyword(s) is/are used to sort the rows in the output A. B. C. D. SORTED ORDER SORT SORT BY ORDER BY 14. How would you return all the rows f rom a table named stage sorted in descending order on the column IName? A. B. C. D. SELECT * FROM Item SORT IName DESC SELECT * FROM Item ORDER BY IName DESC SELECT * FROM Item ORDER IName DESC SELECT * FROM Item SORT BY IName DESC 15. How can you insert a new row into the inventory table? A. B. C. D. INSERT (1,Abc Rice) INTO Store INSERT VALUES (1,Abc Rice) INTO Store INSERT INTO Store VALUES (1,Abc Rice) ADD ROW Store values(1,Abc Rice)INFORMATICS PRACTICES 249 Chapter-9 MySQL 16. Which statement is appropriate to change the first name Madhur to Mridul in the FName column in the Student table? A. B. C. D. UPDATE Student SET FName=Mridul WHERE FName=Madhur MODIFY Student SET FName=Madhur INTO FName=Mridul UPDATE Student SET FName=Madhur INTO FName=Mridul UPDATE Student SET FName=Madhur WHERE FName=Mridul 17. How can you delete the rows with marks below 33 in the Student Table? A. B. C. D. DELETE FROM Student WHERE marks