Relational Algebra |
Understanding |
View |
Edit |
Delete
|
Anomalies, functional dependencies, normalization, normal forms, and conversion to BCNF |
Evaluating |
View |
Edit |
Delete
|
Identify potential for and prevent SQL injections |
Understanding |
View |
Edit |
Delete
|
Integrity, entity, referential and check constraints |
Applying |
View |
Edit |
Delete
|
Model data using tables, rows, columns, keys |
Applying |
View |
Edit |
Delete
|
Views and authorization |
Analyzing |
View |
Edit |
Delete
|
User stories and business requirements |
Applying |
View |
Edit |
Delete
|
Access control: DAC, MAC, RBAC, ABAC |
Applying |
View |
Edit |
Delete
|
SQL procedural language |
Creating |
View |
Edit |
Delete
|
Conceptual, logical models, and physical models; Transform a conceptual model to a logical model and a logical model to a physical model |
Creating |
View |
Edit |
Delete
|
Functions and triggers |
Creating |
View |
Edit |
Delete
|
Data visualization |
Creating |
View |
Edit |
Delete
|
Descriptive statistics |
Applying |
View |
Edit |
Delete
|
Translate user stories to SQL statements using (SELECT, FROM, WHERE, ORDER BY, DISTINCT, LIKE, BETWEEN, IN, JOIN, GROUP BY, HAVING, sub-queries, ANY, ALL, UNION) |
Creating |
View |
Edit |
Delete
|
Translate user stories to SQL statements using (SELECT, FROM, WHERE, ORDER BY, DISTINCT, LIKE, BETWEEN, IN, JOIN, GROUP BY, HAVING, sub-queries, ANY, ALL, UNION) |
Evaluating |
View |
Edit |
Delete
|
Relations, tuples, and fields |
Applying |
View |
Edit |
Delete
|
User stories and business requirements |
Creating |
View |
Edit |
Delete
|