Cloud Computing - Database Introduction

Ғылым және технология

Find code and diagrams at: www.EliTheComputerGuy.com
Databases contain the records that are required for most advanced applications to run. Databases themselves only store data, and you need to create a front end and intelligence for users to be able to interact with it.
Finished product are created by having a database, a Frontend Application, and the intelligence created in a programming language for how data should be written to, and read from the database.
Databases only offer data storage. Unlike MS Access most databases do not offer an easy way to interact with data.
Database Software - There are numerous database products available from ServerBbased to Cloud Services.
Database - is the highest level in a Database
Tables - Are containers for “like” information. Such as information about Parts, or Users
Columns/ Fields - within Tables these are the individual types of information such as First Name, Last Name, Address.
Primary Keys - EVERY record needs to be unique within a Table. To make sure this happens you have a Primary Key such as a UserID, or PartID that is absolutely unique within the Table.
Rows/ Records - Rows are the individual Records stored with a Table.
Schema - Is the Column names within Tables. These are set by the Database Administrator and the Database cannot store Data that has not been anticipated by the Schema.
Relational Databases - have the Tables related to each other by Keys. So an Order Record would include the CustomerID, the PartID, and then any additional information.
Clusters - databases servers are setup in clusters so that if one fails the service is still available. They copy information to each other through a Replication Strategy.
Database Servers can be Read/Write, Read, and just Write. This allows administrators to deploy servers to perform best for what is required and for security.

Пікірлер: 13

  • @casamir1
    @casamir14 жыл бұрын

    The 2 minute disclaimer at the start of the video is how you know Eli has been in the KZread game for a long time.

  • @blueberrypuffin9921
    @blueberrypuffin99214 жыл бұрын

    Looking forward to more database focused videos. Thanks Eli!

  • @frequencyio
    @frequencyio4 жыл бұрын

    I love how you beat our brains to a pulp every time... 👍🏾

  • @franklindelacruz4376
    @franklindelacruz43764 жыл бұрын

    Awesome video Eli! Thanks

  • @brandonfarfan1978
    @brandonfarfan19784 жыл бұрын

    Super informative lesson. I learned alot from this vid.

  • @fabricioroque7076
    @fabricioroque70764 жыл бұрын

    THANKS ELI GOOD VIDEO

  • @AmmuAmmu-xd8ix
    @AmmuAmmu-xd8ix4 жыл бұрын

    Could you explain in the topic" federated learning in mobile edge network"

  • @krishanusingh1608
    @krishanusingh16084 жыл бұрын

    hey eli can you please guide me to some more involved documentation and resources on Paas Databases platforms. Thanks.

  • @robinr2336
    @robinr23364 жыл бұрын

    👍👍

  • @lgrfbs
    @lgrfbs4 жыл бұрын

    This will bee fun.

  • @fluffio2976
    @fluffio29764 жыл бұрын

    Is games of thrones still a thing?

  • @GoldenSheenObsidan
    @GoldenSheenObsidan2 жыл бұрын

    Do our databases collect past information of those who planted things into our software? If so, are we able to tell(identify) who they are due to some who decided to misuse it as a way to harass and stalk and harm others as well as their loved ones databases too? We have a right to identify those who mistreated others as well as try to change them in a way that harmed psychologically and caused physical attacks against innocent bystanders & we have right to protect ourselves through our data from others attacking our families as well as others. Another thing is are they able to switch other people’s database that mixed with others if so, how do we separate our database from those who do not fit our mindsets in their levels of thinking? Why do they harass people with their thoughts and how are businesses managing this in their systems to harass and stalk others and attack them Ina sense, technically physically and mentally as it is damaging towards their former workers or opponents as well as trying to make them look bad in any kind of way and then legally claiming others databases and changing their behaviors to gain more out of their business but in a bad kind of way causing destructive behaviors among others to impose onto those who they choose to attack? How are they using illusions to destroy a persons life or heal as a reward if they comply to someone else’s data base in order to stalk and harass their victims and distort their info. by abuse attacking them spiritually mentally & possibly to the point where they cause bodily harm against others by creating these dangerous illusions into their actual minds from their device in order to replicate suicidal tendencies among others and others mentally unstable issues by harming people? How do we make it stop and how are we to protect ourselves from issues like these from others who try to change something they were never supposed to use it as and how is it that they are showing certain thumbnails showing up on my feed and then quickly taking it down in order to communicate a certain disturbing deciphered message as a way to harass me constantly?

  • @user-bm7bd8xh7z
    @user-bm7bd8xh7z3 жыл бұрын

    Johnny sins lol

Келесі