search
HomeDatabaseMysql TutorialRecommended source code courseware for Black Horse Cloud Classroom mongodb practical video

MongoDB is written in C++ language and is an open source database system based on distributed file storage. "Black Horse Cloud Classroom MongoDB Practical Video Tutorial" ensures the completeness of knowledge points to a large extent. The starting point of the video is carefully designed and recorded for students who have certain database knowledge. Ensure that students can accept and understand the details of knowledge to a greater extent.

Recommended source code courseware for Black Horse Cloud Classroom mongodb practical video

Video playback address: //m.sbmmt.com/course/519.html

The teacher’s teaching style:

is vivid, witty, witty, and touching. A vivid metaphor is like the finishing touch, opening the door to wisdom for students; a well-placed humor brings a knowing smile to students, like drinking a glass of mellow wine, giving people aftertaste and nostalgia; a philosopher's aphorisms, cultural references Proverbs are interspersed from time to time in the narration, giving people thinking and alertness.

The more difficult point in this video is to manage the mongodb account permissions:

MongoDB does not have permission verification by default. But in a production environment, it is very unsafe without permission control.

Without going into too many concepts in detail, let’s create two typical accounts directly:

Super administrator, similar to the sa account of sql server or the root account of mysql

Read and write permission account for a single database

Create super administrator

When the permission verification mechanism is not turned on, we use mongo to open the MongoDB shell in the "Command Indicator" window.

Use the "use" command to switch to the admin database. MongoDB uses the system.users collection of admin to save user information.

> use admin
switched to db admin
>

Use the db.createUser method to create a user. For specific instructions, please refer to the official website document

> db.createUser(...    {...      user: "sa",...      pwd: "123",...      roles: [ { role: "__system", db: "admin" } ]...    }...  )
Successfully added user: {        "user" : "sa",        "roles" : [
                {                        "role" : "__system",                        "db" : "admin"
                }
        ]
}
>

In this way we create an account :sa, password: 123, has the permissions of the "__system" role. For specific instructions on the "__system" role, please refer to the official website document

Warning: Do not assign accounts with the "__system" role to system programs.



Here we also recommend downloading source code resources: //m.sbmmt.com /xiazai/learn/2073

The resources share video courseware and ppt with you:

  1. corresponding notes+PPT+template+source code download address

  2. 黑马云Classroommongodbpractical source code courseware

The above is the detailed content of Recommended source code courseware for Black Horse Cloud Classroom mongodb practical video. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Securing MySQL Default Installations and ConfigurationsSecuring MySQL Default Installations and ConfigurationsJul 24, 2025 am 02:06 AM

Modifying the default root password, deleting anonymous users, banning remote root login, removing test databases, and restricting access ports are key steps in MySQL security hardening. First, use the ALTERUSER command to set a strong password and avoid using the root account to connect to the application; secondly, delete anonymous users'@'localhost' and ''@'your_hostname' through DROPUSER; then check and delete the 'root'@'%' account that allows remote login, or create a restricted dedicated account instead; then delete unnecessary test databases and other irrelevant data; finally restrict port 3306 access through firewall tools, or set bind-addres in the configuration file

Understanding MySQL Indexes for WHERE, ORDER BY, GROUP BYUnderstanding MySQL Indexes for WHERE, ORDER BY, GROUP BYJul 24, 2025 am 02:05 AM

MySQL indexes are not as fast as possible, and they need to be used reasonably according to the query scenario. 1. The WHERE condition medium value query (=) has the best effect. The range query must comply with the principle of leftmost prefix. Fuzzy match LIKE'abc%' can be indexed, LIKE'�c' is not available, and functions or expressions are avoided in the condition. 2. ORDERBY needs to use indexes to avoid file sorting. It requires that the sorting columns have indexes and the WHERE and ORDERBY columns are in the same order to form a joint index, but range query may cause the sorting to be invalid. 3. GROUPBY recommends using an existing index structure, which prioritizes indexes covering equivalent conditions. Discontinuous columns or inappropriate order will add additional overhead. In addition, the EXPLAIN tool should be paid attention to the implementation plan

Troubleshooting MySQL Replication Sync IssuesTroubleshooting MySQL Replication Sync IssuesJul 24, 2025 am 02:03 AM

Common solutions to the MySQL master-slave synchronization problem are as follows: 1. Check whether the master-slave connection is normal, check the error information of the Last_IO_Error and Last_SQL_Error fields to ensure that the main library port is open and the slave library account has REPLICATIONSLAVE permission; 2. Check whether there are SQL execution errors, if the table does not exist or the field type does not match, skip the error and continue synchronization if necessary; 3. Fix data inconsistency, resynchronize full amount through mysqldump or PerconaXtraBackup, or use pt-table-checksum to detect and repair differences; 4. Optimize configuration and adjust sync_binlog and slave_parall

Choosing the Right MySQL Storage Engine: InnoDB vs MyISAM RevisitedChoosing the Right MySQL Storage Engine: InnoDB vs MyISAM RevisitedJul 24, 2025 am 02:02 AM

InnoDB is suitable for scenarios where transactions, foreign keys, and row-level locks are required. 2. MyISAM is suitable for scenarios where more reads, less writes, and 3. Modern MySQL recommends using InnoDB by default. InnoDB supports transaction processing, crash recovery, foreign key constraints and row-level locking, and is suitable for scenarios with high data consistency requirements such as financial transactions and order processing, with good concurrency performance and high reliability; MyISAM is simple in design and fast query speed, suitable for scenarios where reading operations are mainly based on log statistics and report analysis, but write operations will lock the entire table, affecting concurrency performance; Since MySQL5.5, InnoDB has become the default engine, and continues to obtain new functions and is more applicable. Unless there are special needs, it is recommended to choose InnoDB to avoid late migration costs.

Troubleshooting MySQL Replication User PrivilegesTroubleshooting MySQL Replication User PrivilegesJul 24, 2025 am 01:58 AM

MySQL master-slave replication issues are usually caused by improper configuration of replication user rights. 1. Make sure that the replica user has REPLICATIONSLAVE permissions, which can be checked through SHOWGRANTS and added with the GRANT command; 2. Avoid over-authorization and only grant necessary permissions such as REPLICATIONSLAVE and REPLICATIONCLIENT; 3. Check whether the permissions are effective, confirm that there are no spelling errors, FLUSHPRIVILEGES has been executed, the database modification is correct, and MySQL restart is restarted; 4. If the error "Accessdeniedforuser" is reported, the user name and password host should be confirmed, the user existence, firewall and port connectivity should be confirmed.

Optimizing MySQL for Social Media PlatformsOptimizing MySQL for Social Media PlatformsJul 24, 2025 am 01:56 AM

TooptimizeMySQLforsocialmediaplatforms,startwithindexingstrategies,schemadesign,queryoptimization,andconnectionhandling.1)Usecompositeandcoveringindexeswiselytospeedupquerieswithoutslowingdownwrites.2)Normalizecoredataforconsistencyanddenormalizesele

Optimizing MySQL for Gaming Leaderboards and Player StatsOptimizing MySQL for Gaming Leaderboards and Player StatsJul 24, 2025 am 01:44 AM

TooptimizeMySQLforgamingleaderboardsandplayerstats,useproperdatatypesandindexing,optimizequerieswithwindowfunctions,implementcaching,andconsiderpartitioningorshardingatscale.First,useINTorBIGINTforscoresandDECIMALforfractionalvalues,andapplycompoundi

Securing MySQL Administrative Interfaces and ToolsSecuring MySQL Administrative Interfaces and ToolsJul 24, 2025 am 01:41 AM

To avoid exposing the management interface to the public network, it should be accessed through SSH tunnels or intranets; 2. Use a dedicated account and strictly control permissions, disable root remote login; 3. Enable SSL encryption transmission, set strong password policies and cookie authentication; 4. Regularly update the MySQL version and monitor log audit operations. If the MySQL management interface is not protected properly, it should restrict access methods, strengthen authentication, encrypt communications and continuously monitor security status.

See all articles

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment