You are on page 1of 9

* Sybase Developer Training Contents* Duration 5 days

Sybase Training Prerequisites


Basic knowledge of RDBMS but not mandatory

Training Format
This course is delivered as a highly interactive five-day seminar, with extensive good examples.

Training Materials
All attendees would receive a copy of 1. Sybase T-SQL Reference Manual 2. Customized copy of the instructor's presentation

Software Needed on Each Student PC

Connectivity to Linux Server using SSH / TelNET (or ) Putty to be installed on Student PC

Training Objectives

Describe a Relational Database and the structure of a Database Table Describe the Purpose and Organization of T-SQL Use the basic components of ASE to connect to a server database Create tables, populate the tables with data and efficiently query the data Employ data integrity methods to ensure the validity of data Write code in Transact-SQL Manage transaction Write cursors and stored procedures that perform the complex tasks

Course Description:

This course is designed for the Sybase ASE SQL Developers and Users. This course contains Basic concepts and Advanced Topics.

Hands-on/Lecture Ratio
This Java training course is 70% hands-on, 30% lecture, with the longest lecture segments lasting for 20 minutes.

Sybase Duration-5 days DAY-1

Client/Server Architecture and Relational Database Model Client/Server System DBMS & RDBMS Entities and Relationships Normalization Concepts

Sybase Database Sybase Relational Database Sybase Setup Type of Databases Controlling Access

SQL Building Block SQL in Adaptive Server Naming conventions

Expressions in Adaptive Server Transact-SQL extensions Compliance to ANSI standards Adaptive Server login accounts isql utility pubs2 and pubs3 sample databases

Queries: Selecting Data from a Table What are queries? Choosing columns using the select clause Eliminating duplicate query results with distinct Specifying tables with the from clause Selecting rows using the where clause Matching patterns

Using Aggregates, Grouping, and Sorting Using aggregate functions Organizing query results into groups: the group by clause Selecting groups of data: the having clause Sorting query results: the order by clause Summarizing groups of data: the compute clause Combining queries: the union operator

DAY-2
Joins: Retrieving Data from Several Tables

How joins work How joins are structured How joins are processed Equijoins and natural joins Joins with additional conditions Joins not based on equality Self-joins and correlation names The not-equal join Joining more than two tables Outer joins How null values affect joins Determining which table columns to join

Subqueries: Using Queries Within Other Queries How subqueries work Types of subqueries Using correlated subqueries

Using and Creating Datatypes How Transact-SQL datatypes work Using system-supplied datatypes Converting between datatypes Mixed-mode arithmetic and datatype hierarchy Creating user-defined datatypes Getting information about datatypes

Adding, Changing, and Deleting Data Introduction Datatype entry rules Adding new data Changing existing data Changing text, unitext, and image datatex Deleting data Deleting all rows from a table

Creating Databases and Tables What are databases and tables? Using and creating databases Altering the sizes of databases Dropping databases Creating tables Managing identity gaps in tables Defining integrity constraints for tables How to design and create a table Creating new tables from query results: select into Altering existing tables Dropping tables Using computed columns Assigning permissions to users Getting information about databases and tables

DAY-3

SQL Derived Tables Differences from abstract plan derived tables How SQL derived tables work Advantages of SQL derived tables SQL derived table syntax Using SQL derived tables

Partitioning Tables and Indexes Overview Partitioning types Indexes and partitions Creating and managing partitions Altering data partitions Configuring partitions Updating, deleting, and inserting in partitioned tables Updating values in partition-key columns Displaying information about partitions Truncating a partition Using partitions to load table data Updating partition statistics

Views: Limiting Access to Data How views work Creating views Retrieving data through views Modifying data through views

Dropping views Using views as security mechanisms Getting information about views

Creating Indexes on Tables How indexes work Creating indexes Using clustered or nonclustered indexes Specifying index options Dropping indexes Determining what indexes exist on a table Updating statistics about indexes

DAY-4
Defining Defaults and Rules for Data How defaults and rules work Creating defaults Dropping defaults Creating rules Dropping rules Getting information about defaults and rules

Using Batches and Control-of-Flow Language Introduction Rules associated with batches Using control-of-flow language

Local variables Global variables

Using the Built-In Functions in Queries System functions that return database information Text functions used for text, unitext, and image data Aggregate functions Mathematical functions Date functions Datatype conversion functions Security functions

Using Stored Procedures How stored procedures work Creating and executing stored procedures Returning information from stored procedures Restrictions associated with stored procedures Renaming stored procedures Using stored procedures as security mechanisms Dropping stored procedures System procedures Getting information about stored procedures

DAY-5
Cursors: Accessing Data How cursors work

Using cursors

Triggers: Enforcing Referential Integrity How triggers work Creating triggers Using triggers to maintain referential integrity Multirow considerations Rolling back triggers Nesting triggers Rules associated with triggers Disabling triggers Dropping triggers Getting information about triggers

Transactions: Maintaining Data Consistency and Recovery How transactions work Using transactions Selecting the transaction mode and isolation level Using transactions in stored procedures and triggers Using cursors in transactions Issues to consider when using transactions Backup and recovery of transactions

Locking Commands and Options Setting a time limit on waiting for locks Readpast locking for queue processing

You might also like