You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/quickstart-apt.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ Use the Percona repositories to install using APT.
10
10
11
11
## Installation steps
12
12
13
-
The examles of the "expected output" depend on the operating system. The following examples are based on an installation in Ubuntu 22.04 (Jammy Jellyfish).
13
+
The examples of the "expected output" depend on the operating system. The following examples are based on an installation in Ubuntu 22.04 (Jammy Jellyfish).
14
14
{.power-number}
15
15
16
16
1. Update the package index.
@@ -193,9 +193,9 @@ The examles of the "expected output" depend on the operating system. The followi
193
193
194
194

195
195
196
-
12. Choose the type of authentication, based on the compatibility and the security requirements of your applications.
196
+
12. Choose the type of authentication based on the compatibility and the security requirements of your applications.
197
197
198
-
The Strong password encryption uses a more secure hashing algorithm to store and verify passwords, which makes it harder for attackers to crack them.
198
+
Strong password encryption uses a more secure hashing algorithm to store and verify passwords, which makes it harder for attackers to crack them.
199
199
200
200
The Legacy authentication method uses the older and less secure hashing algorithm that was used in previous versions of MySQL.
201
201
@@ -324,7 +324,7 @@ The examles of the "expected output" depend on the operating system. The followi
324
324
$ sudo systemctl status mysql
325
325
```
326
326
327
-
15. Log in to the server. Use the password that you entered during the installation process, which could be `secret`orwhatever password you have selected. You do not see the characters in the password as you type.
327
+
15. Log in to the server. Use the password you entered during the installation process, which could be `secret` or whatever you have selected. You do not see the characters in the password as you type.
328
328
329
329
```{.bash data-prompt="$"}
330
330
$ mysql -uroot -p
@@ -362,7 +362,7 @@ The examles of the "expected output" depend on the operating system. The followi
362
362
- Enforce data integrity and security using constraints, triggers, views, roles, and permissions.
363
363
- Optimize your data access and performance using indexes, partitions, caching, and other techniques.
364
364
365
-
When you create a table, design your database schema carefully, changing it later may be difficult and costly. You should experiment with concurrency, transactions, locking, isolation, and other issues that may arise when multiple users access the same data. You must backup and restore your data regularly, as data loss or corruption may occur due to hardware failures, human errors, or malicious attacks.
365
+
When you create a table, design your database schema carefully; changing it later may be difficult and costly. You should experiment with concurrency, transactions, locking, isolation, and other issues that may arise when multiple users access the same data. You must back up and restore your data regularly, as data loss or corruption may occur due to hardware failures, human errors, or malicious attacks.
366
366
367
367
To create a database, use the `CREATE DATABASE` statement. You can optionally specify the character set and collation for the database in the statement. After the database is created, select the database using the `USE` statement or the `-D` option in the MySQL client.
368
368
@@ -435,7 +435,7 @@ VALUES
435
435
436
436
## Run a SELECT query
437
437
438
-
SELECT queries retrieve data from one or more tables based on specified criteria. They are the most common type of query and can be used for various purposes, such as displaying, filtering, sorting, aggregating, or joining data. SELECT queries do not modify the data in the database but can affect the performance if the query involves large or complex datasets.
438
+
SELECT queries retrieve data from one or more tables based on specified criteria. They are the most common type of query and can be used for various purposes, such as displaying, filtering, sorting, aggregating, or joining data. SELECT queries do not modify the data in the database but can affect performance if they involve large or complex datasets.
439
439
440
440
441
441
@@ -489,7 +489,7 @@ mysql> SELECT name FROM employees WHERE id = 6;
489
489
490
490
## Run an INSERT query
491
491
492
-
INSERT queries add new data to a table. They are used to populate the database with new information. INSERT queries can insert one or more rows at a time, depending on the syntax. The query may fail if it violates any constraints or rules defined on the table, such as primary keys, foreign keys, unique indexes, or triggers.
492
+
INSERT queries add new data to a table and populate the database with new information. Depending on the syntax, INSERT queries can insert one or more rows at a time. The query may fail if it violates any constraints or rules defined on the table, such as primary keys, foreign keys, unique indexes, or triggers.
493
493
494
494
Insert a row into a table and then run a [SELECT](#run-a-select-query) with a WHERE clause to verify the record was inserted.
495
495
@@ -522,7 +522,7 @@ mysql> SELECT id, name, email, country FROM employees WHERE id = 11;
522
522
523
523
## Run a Delete query
524
524
525
-
DELETE queries remove existing data from a table. They are used to clean up the information no longer needed or relevant in the database. The DELETE queries can delete one or more rows at a time, depending on the specified conditions. They may also trigger cascading deletes on related tables if foreign key constraints are enforced.
525
+
DELETE queries remove existing data from a table. They are used to clean up information no longer needed or relevant in the database. Depending on the specified conditions, DELETE queries can delete one or more rows at a time. They may also trigger cascading deletes on related tables if foreign key constraints are enforced.
526
526
527
527
Delete a row in the table and run a [SELECT](#run-a-select-query) with a WHERE clause to verify the deletion.
0 commit comments