
Foundations of MySQL and PHP
Connect PHP with MySQL to build basic data-driven web applications.

Track
Software Development
Level
Beginner
Language
English
Duration
30 hours
Learning Mode
Learn at ALC or at Home
Introduction
- Explain the role of MySQL in web development and database-driven applications.
- Demonstrate how to install, configure, and manage MySQL databases for PHP applications.
- Apply SQL queries, including DDL (Data Definition Language) and DML (Data Manipulation Language) operations.
- Analyze relational database models, schemas, and entity-relationship (ER) concepts.
- Implement SQL joins, subqueries, and set operations to retrieve and manipulate data efficiently.
- Evaluate the role of indexing, primary keys, foreign keys, and constraints in database optimization.
- Create database views and nested queries to simplify data retrieval and manipulation
What you'll learn ?
- Write and run SQL commands for creating, updating, and retrieving data from MySQL databases.
- Design relational database structures using appropriate data models and normalization techniques.
- Perform complex queries, including inner joins, outer joins, and subqueries.
- Implement indexing, keys, and constraints to improve query performance and data integrity.
- Construct views and nested queries to simplify database interactions.
- Apply ACID properties and manage concurrent database transactions securely.
- Integrate PHP with MySQL to build data-driven web applications.
Syllabus
MYSQL Database
- Introduction
- how to set up SQL SERVER
- How to set up SQL Management Studio
- Managing the Database
Need Of SQL
- Introduction
- Characteristics of SQL
- Advantages of SQL
- Backing & Restoring Data
- Sql in Real Life
- What is Database
- olap vs oltp
- structural vs procedural language
Introduction to Database
- Introduction
- History of DBMS
- Purpose of Database Systems
- Advantages of using the DBMS approach
- Controlling Data Redundancy, Elimination of Inconsistency
- Better service to the users, Flexibility of the System is Improved
- Integrity can be improved,Standards can be enforced,Security can be improved
- Organization’s requirement can be easily identified,Provides backup and Recovery
- Disadvantages of using the DBMS approach
- DBMS and its applications
- Enterprise Information
- Banking and Finance
- Example of a Database (with a Conceptual Data Model)
- Simple example of real world entities and their relationships
SQL Commands
- Types of SQL Commands
- DDL and DML
- Select and Where sql Command
- Check Constraint
- SQL Operators
- Sql Insert and Delete command
- Having SQL Commands
- SQL AVG, IN command and AS(Aliasing)
- SQL Order By Group By
- SQL Min & Max
- Sql Like, Count & Distinct
- SQL all commands with example
- SQL Insert and Delete command
- Introduction
- The Union and Intersect Operation
- Joins with Examples
Set Operations
- Introduction
- The Union and Intersect Operation
- Joins
- Joins with Examples
More About Joins
- Joinning two tables
- Joinning Three Tables
- Fetching the data and linking of different tables
- Example of Join
- The Except Operation
DATA MODELS
- Introduction
- Importance of Data Models
- Advantages of Data Models
- Relational Database
- Why RDBMS is important?
- File Management Systems
- Schemas , Domains and COnstraint
- Hierarchical Databases
- Network Databases
Building block of Database
- Introduction
- Entity
- Weak Entity
- Strong Entity
- Attribute and Its Types
- Relationship
- One on One
- One to Many
- Many to Many
- Degree
- Advantages and Disadvantages of EAV model
Relationship and Data Abstraction
- Relational Schema
- Cardinality
- Constraints in Relational Model
- Anomalies in Relational model
- Codd Rules
- Advantages of Using Relational Model
- Disadvantages
- Logical Views of Data & its Characterstics
- Attributes
- Tuples
- Keys
- Feature of Good Relational Model Design
KEYS
- Null values
- Primary Key
- Queries with Example
- Unique Key
- Queries with Example
- Default Key
- Queries with Example
- Foreign Key
- Queries with Example
- Default Value
- Queries with Example
- Check Integrity Constraints
Data Abstraction in SQL
- Data Abstraction
- View Leval
- Conceptual Leval
- Physical Leval
- SQL Indexing
- Types of Indexing
- Primary Indexing
- Secondary Indexing
- Clustering Index
- Creating a Index
- Deleting a Index
- Indexing Strategy Guidelines
Views in SQL
- Introduction
- Creation of views
- Selecting a Data From View
- Updating Views
- Destroying A view
- Nested Queries
- Complex Queries
- Example of Complex queries
- Set Membership
- Set Comparison
- Test for Empty Relations
Normalization
- Introduction
- 1NF
- 1NF Example
- 2NF
- How to Decompose table in 2NF
- 2NF Example
- 3NF
- How to Decompose table in 3NF
- 3NF Example
- BCNF
- How to Identify BCNF
- BCNF Example
Transaction Control
- ACID Properties
- Transaction States
- Lost Update Problem
- Serial schedule vs non Serial schdeule
- View and Conflict Serializablity
- Examples
Work-Centric Approach
The academic approach of the course focuses on ‘work-centric’ education. With this hands-on approach, derive knowledge from and while working to make it more wholesome, delightful and useful. The ultimate objective is to empower learners to also engage in socially useful and productive work. It aims at bringing learners closer to their rewarding careers as well as to the development of the community.
- Step 1: Learners are given an overview of the course and its connection to life and work
- Step 2: Learners are exposed to the specific tool(s) used in the course through the various real-life applications of the tool(s).
- Step 3: Learners are acquainted with the careers and the hierarchy of roles they can perform at workplaces after attaining increasing levels of mastery over the tool(s).
- Step 4: Learners are acquainted with the architecture of the tool or tool map so as to appreciate various parts of the tool, their functions, utility and inter-relations.
- Step 5: Learners are exposed to simple application development methodology by using the tool at the beginner’s level.
- Step 6: Learners perform the differential skills related to the use of the tool to improve the given ready-made industry-standard outputs.
- Step 7: Learners are engaged in appreciation of real-life case studies developed by the experts.
- Step 8: Learners are encouraged to proceed from appreciation to imitation of the experts.
- Step 9: After the imitation experience, they are required to improve the expert’s outputs so that they proceed from mere imitation to emulation.
- Step 10: Emulation is taken a level further from working with differential skills towards the visualization and creation of a complete output according to the requirements provided. (Long Assignments)
- Step 11: Understanding the requirements, communicating one’s own thoughts and presenting are important skills required in facing an interview for securing a work order/job. For instilling these skills, learners are presented with various subject-specific technical as well as HR-oriented questions and encouraged to answer them.
- Step 12: Finally, they develop the integral skills involving optimal methods and best practices to produce useful outputs right from scratch, publish them in their ePortfolio and thereby proceed from emulation to self-expression, from self-expression to self-confidence and from self-confidence to self-reliance and self-esteem!