Skip to content

Commit c831b46

Browse files
authored
Merge pull request #564 from percona/patrickbirch-patch-1
Update quickstart-apt.md
2 parents 205bb2d + bfff699 commit c831b46

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

docs/quickstart-apt.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Use the Percona repositories to install using APT.
1010

1111
## Installation steps
1212

13-
The examles of the "expected output" depend on the operating system. The following examples are based on an installation in Ubuntu 22.04 (Jammy Jellyfish).
13+
The examples of the "expected output" depend on the operating system. The following examples are based on an installation in Ubuntu 22.04 (Jammy Jellyfish).
1414
{.power-number}
1515

1616
1. Update the package index.
@@ -193,9 +193,9 @@ The examles of the "expected output" depend on the operating system. The followi
193193

194194
![Confirm the password](_static/confirm-password.png "Confirm the password")
195195

196-
12. Choose the type of authentication, based on the compatibility and the security requirements of your applications.
196+
12. Choose the type of authentication based on the compatibility and the security requirements of your applications.
197197

198-
The Strong password encryption uses a more secure hashing algorithm to store and verify passwords, which makes it harder for attackers to crack them.
198+
Strong password encryption uses a more secure hashing algorithm to store and verify passwords, which makes it harder for attackers to crack them.
199199

200200
The Legacy authentication method uses the older and less secure hashing algorithm that was used in previous versions of MySQL.
201201

@@ -324,7 +324,7 @@ The examles of the "expected output" depend on the operating system. The followi
324324
$ sudo systemctl status mysql
325325
```
326326
327-
15. Log in to the server. Use the password that you entered during the installation process, which could be `secret`orwhatever password you have selected. You do not see the characters in the password as you type.
327+
15. Log in to the server. Use the password you entered during the installation process, which could be `secret` or whatever you have selected. You do not see the characters in the password as you type.
328328
329329
```{.bash data-prompt="$"}
330330
$ mysql -uroot -p
@@ -362,7 +362,7 @@ The examles of the "expected output" depend on the operating system. The followi
362362
- Enforce data integrity and security using constraints, triggers, views, roles, and permissions.
363363
- Optimize your data access and performance using indexes, partitions, caching, and other techniques.
364364
365-
When you create a table, design your database schema carefully, changing it later may be difficult and costly. You should experiment with concurrency, transactions, locking, isolation, and other issues that may arise when multiple users access the same data. You must backup and restore your data regularly, as data loss or corruption may occur due to hardware failures, human errors, or malicious attacks.
365+
When you create a table, design your database schema carefully; changing it later may be difficult and costly. You should experiment with concurrency, transactions, locking, isolation, and other issues that may arise when multiple users access the same data. You must back up and restore your data regularly, as data loss or corruption may occur due to hardware failures, human errors, or malicious attacks.
366366
367367
To create a database, use the `CREATE DATABASE` statement. You can optionally specify the character set and collation for the database in the statement. After the database is created, select the database using the `USE` statement or the `-D` option in the MySQL client.
368368
@@ -435,7 +435,7 @@ VALUES
435435
436436
## Run a SELECT query
437437
438-
SELECT queries retrieve data from one or more tables based on specified criteria. They are the most common type of query and can be used for various purposes, such as displaying, filtering, sorting, aggregating, or joining data. SELECT queries do not modify the data in the database but can affect the performance if the query involves large or complex datasets.
438+
SELECT queries retrieve data from one or more tables based on specified criteria. They are the most common type of query and can be used for various purposes, such as displaying, filtering, sorting, aggregating, or joining data. SELECT queries do not modify the data in the database but can affect performance if they involve large or complex datasets.
439439
440440
441441
@@ -489,7 +489,7 @@ mysql> SELECT name FROM employees WHERE id = 6;
489489
490490
## Run an INSERT query
491491
492-
INSERT queries add new data to a table. They are used to populate the database with new information. INSERT queries can insert one or more rows at a time, depending on the syntax. The query may fail if it violates any constraints or rules defined on the table, such as primary keys, foreign keys, unique indexes, or triggers.
492+
INSERT queries add new data to a table and populate the database with new information. Depending on the syntax, INSERT queries can insert one or more rows at a time. The query may fail if it violates any constraints or rules defined on the table, such as primary keys, foreign keys, unique indexes, or triggers.
493493
494494
Insert a row into a table and then run a [SELECT](#run-a-select-query) with a WHERE clause to verify the record was inserted.
495495
@@ -522,7 +522,7 @@ mysql> SELECT id, name, email, country FROM employees WHERE id = 11;
522522
523523
## Run a Delete query
524524
525-
DELETE queries remove existing data from a table. They are used to clean up the information no longer needed or relevant in the database. The DELETE queries can delete one or more rows at a time, depending on the specified conditions. They may also trigger cascading deletes on related tables if foreign key constraints are enforced.
525+
DELETE queries remove existing data from a table. They are used to clean up information no longer needed or relevant in the database. Depending on the specified conditions, DELETE queries can delete one or more rows at a time. They may also trigger cascading deletes on related tables if foreign key constraints are enforced.
526526
527527
Delete a row in the table and run a [SELECT](#run-a-select-query) with a WHERE clause to verify the deletion.
528528

0 commit comments

Comments
 (0)