Triggers are stored PL/SQL blocks that are associated with a table, view, schema or database and execute automatically when a triggering event occurs. There are two types of triggers: application triggers that fire on application events and database triggers that fire on data or system events. Triggers can be used to centralize global operations, perform related actions, enforce complex integrity constraints and compute derived values automatically. The timing of a trigger determines whether it executes before or after the triggering event.
07 Using Oracle-Supported Package in Application Developmentrehaniltifat
This document discusses using Oracle-supplied packages for application development. It describes the UTL_MAIL package for managing email, including procedures for sending messages with and without attachments. It also covers the DBMS_SCHEDULER package for automating jobs, including how to create, run, stop, and drop jobs. Finally, it discusses dynamic SQL and executing SQL statements programmatically using native dynamic SQL statements or the DBMS_SQL package.
This document discusses database object dependencies in Oracle. It describes how different types of objects can reference other objects, creating dependencies. It defines direct and indirect dependencies. It also covers local dependencies within a database and remote dependencies that can occur between databases in a distributed system. The document discusses how Oracle tracks and manages dependencies and recompiles objects when dependencies change.
This document discusses database triggers in Oracle, including:
- Database triggers fire on data events like DML or system events like logon and can be used to centralize operations or perform related actions.
- Triggers can be defined to fire before, after or instead of triggering events and can be statement triggers that fire once per statement or row triggers that fire once per row.
- Examples are provided for creating triggers that validate data, audit changes, and derive values from other columns.
- Special trigger variables like :NEW and :OLD allow access to old and new row values in row triggers.
This document provides an overview of executable statements in PL/SQL blocks. It discusses lexical units like identifiers, delimiters, and literals. It describes PL/SQL block syntax and guidelines for writing executable code. It also covers commenting code, using SQL functions, data type conversion, and nested blocks. The document provides examples and best practices for writing readable and maintainable PL/SQL code.
This document discusses stored procedures and functions in Oracle databases. It covers:
- What procedures and functions are and how they can be created using PL/SQL syntax.
- Parameters for procedures and functions, including IN, OUT, and IN OUT parameter modes.
- Developing procedures and functions, including compiling, storing, and executing them.
- Benefits of using procedures and functions such as improved maintainability and performance.
The document discusses the DBMS_METADATA package in Oracle, which provides a centralized way to extract, manipulate, and resubmit metadata. It allows fetching an object's metadata as XML, transforming the XML, and resubmitting it to recreate the object. The package includes subprograms for opening a metadata extraction, setting filters, fetching metadata in various formats, and closing the extraction. It also discusses browsing APIs and examples of using filters and transforms.
The document discusses various concepts related to using packages in PL/SQL, including overloading subprograms, forward declarations, package initialization blocks, persistent state of package variables, using PL/SQL tables of records in packages, wrapping PL/SQL code into a standalone utility, and utilizing Oracle-supplied packages like DBMS_OUTPUT and UTL_FILE for debugging and file processing.
11 Understanding and Influencing the PL/SQL Compilarrehaniltifat
This document discusses normalization of a sales tax invoice database. It begins by showing an initial sales tax invoice table that is not normalized. It then shows the tables after normalization into first normal form (1NF), second normal form (2NF), and third normal form (3NF). The normalized tables separate the data into tables for the invoice, buyer, product, tax, and price details.
07 Using Oracle-Supported Package in Application Developmentrehaniltifat
This document discusses using Oracle-supplied packages for application development. It describes the UTL_MAIL package for managing email, including procedures for sending messages with and without attachments. It also covers the DBMS_SCHEDULER package for automating jobs, including how to create, run, stop, and drop jobs. Finally, it discusses dynamic SQL and executing SQL statements programmatically using native dynamic SQL statements or the DBMS_SQL package.
This document discusses database object dependencies in Oracle. It describes how different types of objects can reference other objects, creating dependencies. It defines direct and indirect dependencies. It also covers local dependencies within a database and remote dependencies that can occur between databases in a distributed system. The document discusses how Oracle tracks and manages dependencies and recompiles objects when dependencies change.
This document discusses database triggers in Oracle, including:
- Database triggers fire on data events like DML or system events like logon and can be used to centralize operations or perform related actions.
- Triggers can be defined to fire before, after or instead of triggering events and can be statement triggers that fire once per statement or row triggers that fire once per row.
- Examples are provided for creating triggers that validate data, audit changes, and derive values from other columns.
- Special trigger variables like :NEW and :OLD allow access to old and new row values in row triggers.
This document provides an overview of executable statements in PL/SQL blocks. It discusses lexical units like identifiers, delimiters, and literals. It describes PL/SQL block syntax and guidelines for writing executable code. It also covers commenting code, using SQL functions, data type conversion, and nested blocks. The document provides examples and best practices for writing readable and maintainable PL/SQL code.
This document discusses stored procedures and functions in Oracle databases. It covers:
- What procedures and functions are and how they can be created using PL/SQL syntax.
- Parameters for procedures and functions, including IN, OUT, and IN OUT parameter modes.
- Developing procedures and functions, including compiling, storing, and executing them.
- Benefits of using procedures and functions such as improved maintainability and performance.
The document discusses the DBMS_METADATA package in Oracle, which provides a centralized way to extract, manipulate, and resubmit metadata. It allows fetching an object's metadata as XML, transforming the XML, and resubmitting it to recreate the object. The package includes subprograms for opening a metadata extraction, setting filters, fetching metadata in various formats, and closing the extraction. It also discusses browsing APIs and examples of using filters and transforms.
The document discusses various concepts related to using packages in PL/SQL, including overloading subprograms, forward declarations, package initialization blocks, persistent state of package variables, using PL/SQL tables of records in packages, wrapping PL/SQL code into a standalone utility, and utilizing Oracle-supplied packages like DBMS_OUTPUT and UTL_FILE for debugging and file processing.
11 Understanding and Influencing the PL/SQL Compilarrehaniltifat
This document discusses normalization of a sales tax invoice database. It begins by showing an initial sales tax invoice table that is not normalized. It then shows the tables after normalization into first normal form (1NF), second normal form (2NF), and third normal form (3NF). The normalized tables separate the data into tables for the invoice, buyer, product, tax, and price details.
03 Writing Control Structures, Writing with Compatible Data Types Using Expli...rehaniltifat
This document discusses composite data types in PL/SQL including records, collections like index by tables and nested tables, and using explicit cursors. It provides examples of declaring different composite data types like records and index by tables, using %ROWTYPE attribute, and controlling explicit cursors through open, fetch, close operations and cursor attributes. It also discusses using cursors with parameters and FOR UPDATE/WHERE CURRENT OF clauses for locking and updating rows.
This document discusses different types of joins in SQL, including inner joins, outer joins, self joins, and cross joins. It provides examples of SQL queries using each type of join to retrieve data from multiple tables based on relationships between columns. The key types of joins covered are equijoins to match column values, non-equijoins to match column ranges, and outer joins to return non-matching rows.
This document discusses different types of joins in SQL for combining data from multiple tables, including:
1. Equijoins to retrieve data based on matching column values.
2. Outer joins to also return rows with non-matching column values.
3. Self-joins to join a table to itself based on related columns.
This document provides an introduction to database management systems (DBMS) and SQL Server. It discusses what a database is and where databases are used. It then explains what a DBMS is and some examples of DBMS software. The document goes on to describe the relational database model including entities, attributes, relationships and keys. It also discusses the entity-relationship model. Finally, it covers SQL statements including DDL, DML, and DCL and provides examples of commands for creating tables, inserting and updating data, and setting privileges.
Part 3 of the SQL Tuning workshop examines the different aspects of an execution plan, from cardinality estimates to parallel execution and explains what information you should be gleaming from the plan and how it affects the execution. It offers insight into what caused the Optimizer to make the decision it did as well as a set of corrective measures that can be used to improve each aspect of the plan.
Collections are PL/SQL's approach to arrays. We have three types of collections (associative arrays, nested tables, varrays) and this presentation explores both the common features of these datatypes, and their differing characteristics. Copyright 2016 Oracle Corporation.
This document provides a summary of Oracle 9i and related database concepts. It covers relational database management systems (RDBMS) and what they are used for. It also discusses Oracle built-in data types, SQL and its uses, normalization, indexes, functions, grouping data, and other database objects like views and sequences. The document is intended as a presentation on key aspects of working with Oracle 9i databases.
Presentation slides of Sequence Query Language (SQL)Punjab University
SQL is a language used to communicate with and perform operations on relational database management systems (RDBMS). The document outlines what SQL is, what it can do, important SQL commands like SELECT, INSERT, UPDATE and DELETE, how to create and drop databases and tables, and key concepts like primary keys, foreign keys, and constraints. SQL allows users to retrieve, manipulate and transform data stored in an RDBMS through statements that include keywords, clauses, aggregates, expressions, identifiers, parameters, and operators.
SQL is a database query language used to store and manage data in relational database management systems (RDBMS). SQL commands are divided into four categories: DDL for defining database schemas, DML for manipulating data, DCL for controlling access privileges, and DQL for querying data. Some common SQL operations include JOINs to combine data from multiple tables and SET operations like UNION, INTERSECT, and MINUS.
This document provides an overview of SQL (Structured Query Language). It defines SQL as a standard language for accessing and manipulating databases. It describes what SQL can do, such as execute queries, retrieve, insert, update and delete data. It also covers important SQL statements (SELECT, UPDATE, DELETE, INSERT), clauses (WHERE, ORDER BY), operators (LIKE), joins, and functions. In addition, it discusses SQL data types, constraints, creating tables and indexes.
Displaying Data from Multiple Tables - Oracle Data BaseSalman Memon
This document discusses different types of joins in SQL for combining data from multiple tables, including:
- Inner joins, which return rows that match the join condition between two tables.
- Outer joins, which return all rows from one table and matched rows from the other table.
- Self joins, which join a table to itself to link records together such as employees and their managers.
The document provides examples of joins using both Oracle's proprietary syntax and the SQL:1999 standard syntax.
This document provides an agenda and overview for a two-day PL/SQL Fundamentals training course. The agenda covers key PL/SQL concepts like language features, the DECLARE, BEGIN, and EXCEPTION clauses, explicit cursors, nested blocks, and declared subprograms. Students will learn to program with PL/SQL using a sample COMPANY database that will be set up on Oracle Database Express Edition. The course is a prerequisite for more advanced PL/SQL trainings.
SQL is a standard language for accessing and manipulating databases. The document provides an introduction to SQL basics including SQL statements to select, insert, update and delete data from database tables. It explains key SQL components like the WHERE clause for filtering records and the ORDER BY clause for sorting query results. Examples are given for each SQL statement and concept discussed.
This document provides a lesson on using SQL SELECT statements to retrieve data from database tables. It covers the basic SELECT statement syntax, selecting specific columns, column aliases, arithmetic expressions, NULL values, concatenation operators, literal strings, the DISTINCT keyword, and using the DESCRIBE command to view table structures. The objectives are to be able to list the capabilities of SQL SELECT statements and execute a basic SELECT statement.
The document discusses stored procedures in databases. It defines stored procedures as procedures that are stored in a database with a name, parameter list, and SQL statements. The key points covered include:
- Stored procedures are created using the CREATE PROCEDURE statement and can contain SQL statements and control flow statements like IF/THEN.
- Parameters can be used to pass data into and out of stored procedures.
- Variables can be declared and used within stored procedures.
- Cursors allow stored procedures to iterate through result sets row by row to perform complex logic.
- Error handling and exceptions can be managed within stored procedures using DECLARE HANDLER.
Stored procedures offer benefits
This document provides an overview of SQL programming including:
- A brief history of SQL and how it has evolved over time.
- Key SQL fundamentals like database structures, tables, relationships, and normalization.
- How to define and modify database structures using commands like CREATE, ALTER, DROP.
- How to manipulate data using INSERT, UPDATE, DELETE, and transactions.
- How to retrieve data using SELECT statements, joins, and other techniques.
- How to aggregate data using functions like SUM, AVG, MAX, MIN, and COUNT.
- Additional topics covered include subqueries, views, and resources for further learning.
This document discusses handling exceptions in PL/SQL. It explains that exceptions can be raised implicitly by the Oracle server or explicitly in a program. Exceptions can be handled by trapping them with an exception handler or propagating them to the calling environment. It provides details and examples of trapping predefined Oracle exceptions, user-defined exceptions, and non-predefined Oracle exceptions. It also discusses exception handling in calling environments like procedures.
PL/SQL is Oracle's standard language for accessing and manipulating data in Oracle databases. It allows developers to integrate SQL statements with procedural constructs like variables, conditions, and loops. PL/SQL code is organized into blocks that define a declarative section for variable declarations and an executable section containing SQL and PL/SQL statements. Variables can be scalar, composite, reference, or LOB types and are declared in the declarative section before being used in the executable section.
Un disparador es un procedimiento almacenado asociado a una tabla que se ejecuta antes o después de una operación DML (INSERT, UPDATE o DELETE) sobre la tabla. Los disparadores pueden usarse para evitar transacciones inválidas, hacer cumplir restricciones de integridad y reglas de negocio, y generar valores derivados. Al diseñar disparadores se debe evitar la recursividad, mantener un tamaño moderado, y no duplicar restricciones ya definidas en el esquema.
03 Writing Control Structures, Writing with Compatible Data Types Using Expli...rehaniltifat
This document discusses composite data types in PL/SQL including records, collections like index by tables and nested tables, and using explicit cursors. It provides examples of declaring different composite data types like records and index by tables, using %ROWTYPE attribute, and controlling explicit cursors through open, fetch, close operations and cursor attributes. It also discusses using cursors with parameters and FOR UPDATE/WHERE CURRENT OF clauses for locking and updating rows.
This document discusses different types of joins in SQL, including inner joins, outer joins, self joins, and cross joins. It provides examples of SQL queries using each type of join to retrieve data from multiple tables based on relationships between columns. The key types of joins covered are equijoins to match column values, non-equijoins to match column ranges, and outer joins to return non-matching rows.
This document discusses different types of joins in SQL for combining data from multiple tables, including:
1. Equijoins to retrieve data based on matching column values.
2. Outer joins to also return rows with non-matching column values.
3. Self-joins to join a table to itself based on related columns.
This document provides an introduction to database management systems (DBMS) and SQL Server. It discusses what a database is and where databases are used. It then explains what a DBMS is and some examples of DBMS software. The document goes on to describe the relational database model including entities, attributes, relationships and keys. It also discusses the entity-relationship model. Finally, it covers SQL statements including DDL, DML, and DCL and provides examples of commands for creating tables, inserting and updating data, and setting privileges.
Part 3 of the SQL Tuning workshop examines the different aspects of an execution plan, from cardinality estimates to parallel execution and explains what information you should be gleaming from the plan and how it affects the execution. It offers insight into what caused the Optimizer to make the decision it did as well as a set of corrective measures that can be used to improve each aspect of the plan.
Collections are PL/SQL's approach to arrays. We have three types of collections (associative arrays, nested tables, varrays) and this presentation explores both the common features of these datatypes, and their differing characteristics. Copyright 2016 Oracle Corporation.
This document provides a summary of Oracle 9i and related database concepts. It covers relational database management systems (RDBMS) and what they are used for. It also discusses Oracle built-in data types, SQL and its uses, normalization, indexes, functions, grouping data, and other database objects like views and sequences. The document is intended as a presentation on key aspects of working with Oracle 9i databases.
Presentation slides of Sequence Query Language (SQL)Punjab University
SQL is a language used to communicate with and perform operations on relational database management systems (RDBMS). The document outlines what SQL is, what it can do, important SQL commands like SELECT, INSERT, UPDATE and DELETE, how to create and drop databases and tables, and key concepts like primary keys, foreign keys, and constraints. SQL allows users to retrieve, manipulate and transform data stored in an RDBMS through statements that include keywords, clauses, aggregates, expressions, identifiers, parameters, and operators.
SQL is a database query language used to store and manage data in relational database management systems (RDBMS). SQL commands are divided into four categories: DDL for defining database schemas, DML for manipulating data, DCL for controlling access privileges, and DQL for querying data. Some common SQL operations include JOINs to combine data from multiple tables and SET operations like UNION, INTERSECT, and MINUS.
This document provides an overview of SQL (Structured Query Language). It defines SQL as a standard language for accessing and manipulating databases. It describes what SQL can do, such as execute queries, retrieve, insert, update and delete data. It also covers important SQL statements (SELECT, UPDATE, DELETE, INSERT), clauses (WHERE, ORDER BY), operators (LIKE), joins, and functions. In addition, it discusses SQL data types, constraints, creating tables and indexes.
Displaying Data from Multiple Tables - Oracle Data BaseSalman Memon
This document discusses different types of joins in SQL for combining data from multiple tables, including:
- Inner joins, which return rows that match the join condition between two tables.
- Outer joins, which return all rows from one table and matched rows from the other table.
- Self joins, which join a table to itself to link records together such as employees and their managers.
The document provides examples of joins using both Oracle's proprietary syntax and the SQL:1999 standard syntax.
This document provides an agenda and overview for a two-day PL/SQL Fundamentals training course. The agenda covers key PL/SQL concepts like language features, the DECLARE, BEGIN, and EXCEPTION clauses, explicit cursors, nested blocks, and declared subprograms. Students will learn to program with PL/SQL using a sample COMPANY database that will be set up on Oracle Database Express Edition. The course is a prerequisite for more advanced PL/SQL trainings.
SQL is a standard language for accessing and manipulating databases. The document provides an introduction to SQL basics including SQL statements to select, insert, update and delete data from database tables. It explains key SQL components like the WHERE clause for filtering records and the ORDER BY clause for sorting query results. Examples are given for each SQL statement and concept discussed.
This document provides a lesson on using SQL SELECT statements to retrieve data from database tables. It covers the basic SELECT statement syntax, selecting specific columns, column aliases, arithmetic expressions, NULL values, concatenation operators, literal strings, the DISTINCT keyword, and using the DESCRIBE command to view table structures. The objectives are to be able to list the capabilities of SQL SELECT statements and execute a basic SELECT statement.
The document discusses stored procedures in databases. It defines stored procedures as procedures that are stored in a database with a name, parameter list, and SQL statements. The key points covered include:
- Stored procedures are created using the CREATE PROCEDURE statement and can contain SQL statements and control flow statements like IF/THEN.
- Parameters can be used to pass data into and out of stored procedures.
- Variables can be declared and used within stored procedures.
- Cursors allow stored procedures to iterate through result sets row by row to perform complex logic.
- Error handling and exceptions can be managed within stored procedures using DECLARE HANDLER.
Stored procedures offer benefits
This document provides an overview of SQL programming including:
- A brief history of SQL and how it has evolved over time.
- Key SQL fundamentals like database structures, tables, relationships, and normalization.
- How to define and modify database structures using commands like CREATE, ALTER, DROP.
- How to manipulate data using INSERT, UPDATE, DELETE, and transactions.
- How to retrieve data using SELECT statements, joins, and other techniques.
- How to aggregate data using functions like SUM, AVG, MAX, MIN, and COUNT.
- Additional topics covered include subqueries, views, and resources for further learning.
This document discusses handling exceptions in PL/SQL. It explains that exceptions can be raised implicitly by the Oracle server or explicitly in a program. Exceptions can be handled by trapping them with an exception handler or propagating them to the calling environment. It provides details and examples of trapping predefined Oracle exceptions, user-defined exceptions, and non-predefined Oracle exceptions. It also discusses exception handling in calling environments like procedures.
PL/SQL is Oracle's standard language for accessing and manipulating data in Oracle databases. It allows developers to integrate SQL statements with procedural constructs like variables, conditions, and loops. PL/SQL code is organized into blocks that define a declarative section for variable declarations and an executable section containing SQL and PL/SQL statements. Variables can be scalar, composite, reference, or LOB types and are declared in the declarative section before being used in the executable section.
Un disparador es un procedimiento almacenado asociado a una tabla que se ejecuta antes o después de una operación DML (INSERT, UPDATE o DELETE) sobre la tabla. Los disparadores pueden usarse para evitar transacciones inválidas, hacer cumplir restricciones de integridad y reglas de negocio, y generar valores derivados. Al diseñar disparadores se debe evitar la recursividad, mantener un tamaño moderado, y no duplicar restricciones ya definidas en el esquema.
The document describes steps taken to revoke and grant privileges on database tables to restrict access and demonstrate the effects. Privileges were revoked from users on tables. Roles were created and privileges granted to roles. Views were created to restrict access and allow updating of specific columns. The steps show how database security can be implemented through revoking and granting privileges on tables and views.
In this lesson, you learn what a database trigger is, and what it can be used for.
Triggers allow specified actions to be performed automatically within the database, without having to write any extra application code.
Triggers increase the power of the database, and the power of your application.
You will learn much more about triggers in the following lessons.
This document discusses database triggers. It begins by defining triggers as pre-written scripts that execute when a specific event occurs, such as an insert, update, or delete statement. It then provides the basic syntax for creating a trigger. The document also provides several examples of creating triggers to log changes to tables for auditing or to automatically calculate grades based on marks. It demonstrates how to create before and after triggers on insert, update, and delete statements.
This document discusses different types of PL/SQL programs including anonymous programs, named programs, program units like procedures and functions, variables, parameters, debugging tools, and creating programs using tools like SQL*Plus and Procedure Builder. It also covers packages, libraries, triggers and how to define and create them.
Triggers are stored database procedures that are automatically invoked in response to certain events like data changes. They allow flexible management of data integrity by enforcing business rules. Triggers can be used to log events, gather statistics, modify data when views are updated, enforce referential integrity across nodes, publish database events, prevent operations during certain hours, and enforce complex integrity rules that cannot be defined with constraints alone. Unlike stored procedures, triggers are not explicitly invoked but rather automatically fire in response to triggering events like data modifications.
This document provides an overview of PL/SQL (Embedded SQL) including its basic constructs such as anonymous blocks, procedures, functions, packages, triggers, and cursors. It discusses the benefits of PL/SQL in combining the power of SQL with programming constructs like loops and conditional statements. Examples are provided for each construct to demonstrate their usage.
MySql Triggers Tutorial - The Webs Academythewebsacademy
A SQL trigger is a set of SQL statements stored in the database catalog. A SQL trigger is executed or fired whenever an event associated with a table occurs e.g., insert, update or delete.
Transcript of Presentation(Simple & Compound Interest) for Audiencerehaniltifat
Transcript for Simple & Compound Interest presentation demonstrated at Sheikh Zayed Islamic Centre, University of Karachi. PGD in Islamic Banking & Finance. Course Supervisor: Dr. Zaki ur Rahman (Chairman - Karachi University Business School) Subject: Introduction to Islamic Business & Finance Produced by: Rehan Ahmed (Oct, 2011)
The document summarizes 23 design patterns organized into three categories: Creational patterns, Structural patterns, and Behavioral patterns. Each pattern lists the pattern name, intent, participants, and collaborations in 1-2 sentences. For example, the Singleton pattern ensures a class only has one instance and provides a global point of access to it.
Case study what you can take to the bank(primary functions)rehaniltifat
Case study - what you can take to the bank(Primary functions of a bank), demonstrated at Sheikh Zayed Islamic Centre, University of Karachi in PGD (Second Semester) program for the subject Case Studies for Islamic Banking Institutions. A presentation on "Organizational Structures in Islamic Banking Institutions and functions of a bank and their Job Descriptions" assigned by Mr. Abdul Jabbar Karimi from HMB Bank Limited.
how to protect your sensitive data using oracle database vaultAnar Godjaev
- Oracle Database Vault provides powerful security controls to help protect sensitive application data from unauthorized access and comply with privacy regulations. It controls privileged account access and sensitive operations inside the database using multi-factor authorization.
- Database Vault realms prevent privileged accounts from accessing application schemas, sensitive tables, and stored procedures. It also controls database configuration changes and prevents unauthorized changes to database entitlements.
- Database Vault is configured easily and runs transparently with minimal performance impact. It implements duty separation, restricting even DBA users' access and controling database operations. Once enabled, it provides strong protection of applications and data.
Oracle - Program with PL/SQL - Lession 16Thuan Nguyen
This document describes how to create and use database triggers in Oracle. It discusses the different types of triggers, how to create triggers for DML statements and views, and how to manage triggers. Key points include:
- Triggers can be defined to fire before or after DML statements or instead of DML on views.
- Row triggers fire once per row affected, statement triggers fire once per statement.
- Triggers use OLD and NEW qualifiers to access old and new row values.
- INSTEAD OF triggers on views perform DML instead of the triggering statement.
- Triggers must be carefully tested to avoid unintended consequences.
This document discusses database triggers in Oracle. It describes how to create triggers on various events like DDL statements, system events, and logon/logoff. Triggers can be used to enforce data integrity, security, auditing, and other business rules. The document outlines the benefits of triggers and how to manage, view, and troubleshoot them. Examples are provided to illustrate mutating table exceptions and how to avoid them using package state.
A database trigger is a stored program that automatically executes when a data modification statement is run against a table. Triggers can perform actions like auditing, logging, enforcing business rules, and maintaining replicated data. Triggers are associated with a table and can fire before or after an insert, update, or delete statement on that table. They allow complex actions to be performed transparently in response to SQL statements.
This document discusses SQL data manipulation language statements. It describes how to insert, update, and delete rows from database tables using INSERT, UPDATE, DELETE, and other statements. It also covers transactions, explaining how to commit or rollback changes and control transaction consistency using commands like COMMIT, ROLLBACK, and SAVEPOINT. The goal is to teach how to manipulate data in Oracle database tables through the use of SQL statements.
# Overview of Oracle Database Fundamentals
## Introduction to Oracle, Triggers, and Wrapping
Oracle Database is a powerful and widely used relational database management system (RDBMS). It provides a robust platform for managing large volumes of data efficiently. Key features of Oracle include its ability to handle complex queries, support for multi-user environments, and a comprehensive suite of security measures.
**Triggers** are procedural code executed automatically in response to certain events on a particular table or view in a database. They are essential for maintaining data integrity and enforcing business rules. **Wrapping** in Oracle refers to the process of encoding PL/SQL source code to protect it from unauthorized viewing and tampering.
## Functions/Responsibilities of a DBA
A Database Administrator (DBA) is responsible for the overall management and maintenance of a database system. Key responsibilities include:
- **Installation and Configuration**: Setting up Oracle databases, including installing the software and configuring database instances.
- **Performance Monitoring**: Continuously monitoring database performance to ensure optimal operation and identifying potential issues.
- **Backup and Recovery**: Implementing and managing backup procedures to protect data against loss and ensuring the ability to recover data in case of hardware failures or other disasters.
- **Security Management**: Ensuring that the database is secure from unauthorized access by managing user permissions and roles.
- **Troubleshooting**: Diagnosing and resolving database issues, including performance bottlenecks, connectivity problems, and data corruption.
## Oracle Product Details
Oracle offers a range of products and editions to meet different needs, from small applications to large enterprise systems. Key products include:
- **Oracle Database Standard Edition**: Suitable for small to medium-sized businesses, offering essential database features at a lower cost.
- **Oracle Database Enterprise Edition**: Provides advanced features, including high availability, performance optimization, and security enhancements, ideal for large enterprises.
- **Oracle Cloud**: Oracle's cloud services, including Autonomous Database, which offers self-driving, self-securing, and self-repairing capabilities.
## Oracle Files, System, and User Processes
Oracle database architecture consists of several key components:
- **Control Files**: These files contain metadata about the database structure, including the database name, timestamps, and pointers to data files and redo log files.
- **Data Files**: Store the actual data within the database.
- **Redo Log Files**: Record all changes made to the data, enabling recovery in case of a failure.
- **System Processes**: Manage tasks such as memory allocation, I/O operations, and process scheduling.
- **User Processes**: Handle interactions between the user applications and the database.
Oracle - Program with PL/SQL - Lession 17Thuan Nguyen
This document discusses advanced concepts for creating and using database triggers in Oracle. It covers creating triggers on DDL statements, system events, and tables. Triggers can be used to enforce security, data integrity, referential integrity, event logging, and compute derived values. The document provides examples of triggers for these purposes and discusses best practices for managing triggers.
This document discusses data manipulation language (DML) statements in Oracle databases. It describes how to insert new rows into tables, update and modify existing rows, delete rows from tables, and control transactions using commands like COMMIT, ROLLBACK, and SAVEPOINT. Examples are provided for each DML statement and how to use them to manipulate data in database tables.
The document provides information about stored procedures in databases:
- A stored procedure is a way to encapsulate repetitive tasks like queries into reusable code blocks stored in the database.
- Stored procedures offer advantages like precompiled execution for improved performance, reduced network traffic, code reuse, and enhanced security.
- The example shows how to create a stored procedure using delimiters to change parsing behavior and pass parameters to a procedure. Cursors allow fetching multiple rows from a result set into variables.
These are the slides I used to present "MySQL Performance Schema" at FOSSASIA, 2015 Singapore. It gives an overview of Performance Schema and also explains how it could be used to diagnose issues using few use cases.
Here is the output of the trigger code:
The trigger monster_audit will log changes made to the monster table to the mo_audit table.
When a row is inserted into the monster table, the trigger will insert a row into mo_audit with:
- new_name column populated with the name from the inserted row
- old_name column set to null
- user_name populated with the username of the user performing the insert
- entry_date populated with the current timestamp
- operation set to 'Insert'
When a row is deleted from the monster table, the trigger will insert a row into mo_audit with:
- new_name column set to null
-
Oaktable World 2014 Toon Koppelaars: database constraints polite excuseKyle Hailey
The document discusses validation execution models for SQL assertions. It proposes moving from less efficient models that evaluate all assertions for every change (EM1) to more efficient models. Later models (EM3-EM5) evaluate only assertions involving changed tables, columns or literals based on parsing the assertion and change being made. The most efficient model (EM5) evaluates assertions only when the change transition effect potentially impacts the assertion. Overall the document argues SQL assertions could improve data quality if DBMS vendors supported more optimized evaluation models.
Exceptions Triggers function in SQL by Vasant Bhabadvasant Bhabad
Exceptions in PL/SQL refer to error conditions that occur during program execution. PL/SQL supports catching exceptions using an EXCEPTION block to handle the error. There are system-defined and user-defined exceptions. Common system exceptions include ZERO_DIVIDE for division by zero and NO_DATA_FOUND if a query returns no rows. Functions and procedures use EXCEPTION blocks to catch and handle errors. Database triggers allow PL/SQL code to automatically execute in response to INSERT, UPDATE, or DELETE statements on a table.
This lesson display some of topics like: 1- Create simple and complex views. 2- Retrieve data from views. 3- Create, maintain, and use sequences. 4- Create and maintain indexes. 5- Create private and public synonyms
1. The document describes how to create and use stored procedures in Oracle, including defining parameters, parameter passing modes, and developing procedures.
2. Key aspects of procedures are that they promote reusability and maintainability, are created using the CREATE PROCEDURE statement, and can accept parameters to communicate data between the calling environment and the procedure.
3. Parameters can be defined using modes like IN, OUT, and IN OUT to determine how data is passed into and out of a procedure.
This document discusses how to create and manage various schema objects in an Oracle database including views, sequences, indexes, and synonyms. Views allow querying of data from underlying tables, sequences generate unique numbers, indexes improve query performance, and synonyms provide alternative names for objects. The document provides examples of creating each of these object types and modifying or removing them.
This document provides an overview of managing data and concurrency in Oracle databases. It covers using SQL to manipulate data through INSERT, UPDATE, DELETE, and MERGE commands. It also describes PL/SQL objects like packages, procedures, functions and triggers. Finally, it discusses how to monitor and resolve locking conflicts that can occur from concurrent transactions through detecting and resolving blocking sessions and deadlocks.
After completing this lesson, you should be able
to do the following:
Describe a view
Create, alter the definition of, and drop a view
Retrieve data through a view
Insert, update, and delete data througha view
Create and use an inline view
Perform “Top-N” analysis
http://phpexecutor.com
MySQL Troubleshooting with the Performance SchemaSveta Smirnova
This document discusses using the Performance Schema in MySQL to troubleshoot performance issues. It provides an overview of the Performance Schema and what information it collects. It then discusses how to use specific Performance Schema tables like events_statements_history_long, events_stages_history_long, and others to identify statements that examine too many rows, issues with index usage, and which internal operations are taking a long time. The document provides examples of queries to run and what to look for in the Performance Schema output to help troubleshoot and optimize SQL statements.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.