How to Insert Data Into MySQL Database Using PHP

INSERT : The INSERT INTO statement is used to add new records to a MySQL table . Syntax : NSERT INTO table_name (column1, column2, column3,…)VALUES (value1, value2, value3,…) PHP MySQL INSERT Query : SQL query using the INSERT INTO statement with appropriate values, after that we will execute this insert query through passing it to the PHP Mysqli_query function to insert … Read more

What is MySQL SELECT Statement And Example of MySQL SELECT Query

MySQL SELECT Statement : The select statement is used to select data from a database. The SELECT statement in MySQL is used to fetch data from one or more tables. We can retrieve records of all fields or specified fields that match specified criteria using this statement. Syntax : SELECT column1, column2, …FROM table_nameWHERE condition; You can use one or more tables separated by … Read more

What is MySQL Cluster vs Replication ?

What is MySQL Cluster Manager Architecture:MySQL Cluster Manager is a distributed client/server application consisting of two main components. The MySQL Cluster Manager agent is a set of one or more agent processes that manage NDB Cluster nodes, and the MySQL Cluster Manager client provides a command-line interface to the agent’s management functions.A Cluster is a … Read more

What is Need of Information Security?

Information Security : Information security covers the tools and processes that organizations use to protect information. Information Security is not only about securing information from unauthorized access. It is basically the practice of preventing unauthorized access, use ,disclosure, disruption , modification , inspection , recording or destruction of information.  The Need of Information Security : … Read more

What is Information Security ?

What is Security ? Security is a system to Protected computerized system and its data from Intentional or un-intentional threats or from un-authorized access. Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization’s digital assets. An effective security strategy uses a range of approaches to minimize vulnerabilities … Read more