An Oracle database consists of objects like tables, views, and stored programs owned by user accounts. Users can query and modify database objects using SQL commands, which are divided into DDL commands that define and modify object structures and DML commands that manipulate data. The document outlines how to create user accounts, define tables with fields, constraints, and data types, and use SQL*Plus to issue SQL statements and view metadata in the Oracle data dictionary.
Introduction to structured query language (sql)Sabana Maharjan
This document provides an introduction to structured query language (SQL). It discusses the two broad categories of SQL functions: data definition language and data manipulation language. The data definition language includes commands for creating database objects like tables and views, while the data manipulation language includes commands for inserting, updating, deleting, and retrieving data from tables. The document then covers topics like SQL data types, table structures, constraints, indexes, and basic data manipulation commands. It also discusses more advanced SQL concepts such as joins, aggregate functions, and views.
This document provides an overview of tools for PL/SQL development like Oracle SQL Developer and SQL*Plus. It also summarizes key SQL concepts including data definition, manipulation, retrieval, and security commands. Basic SQL elements such as constants, operators, conditions, data types, comments, and variables are also defined.
SQL is a language used to communicate with databases and manage data. It allows users to create, update, and retrieve data from databases. The document outlines the history of SQL and its evolution over time. It also describes key SQL concepts like data types, commands, primary keys, database normalization, and techniques for ensuring data integrity.
This document provides an overview of SQL programming including:
- A brief history of SQL and how it has evolved over time.
- Key SQL fundamentals like database structures, tables, relationships, and normalization.
- How to define and modify database structures using commands like CREATE, ALTER, DROP.
- How to manipulate data using INSERT, UPDATE, DELETE, and transactions.
- How to retrieve data using SELECT statements, joins, and other techniques.
- How to aggregate data using functions like SUM, AVG, MAX, MIN, and COUNT.
- Additional topics covered include subqueries, views, and resources for further learning.
This document provides an overview of structured query language (SQL) and basic database concepts. It defines common database terms like data, information, fields, records, tuples, attributes, and keys. It also describes SQL's data definition language for creating tables, data manipulation language for inserting, updating and deleting data, and transaction control language. The document outlines various SQL data types, constraints, operators and functions. It provides examples of SQL commands for creating tables, inserting data, querying with select statements, and ordering and grouping query results.
This document provides an overview of SQL (Structured Query Language). It discusses that SQL is used to define, manipulate, and control data in a relational database. It can define database schemas, insert, modify, retrieve, and delete data from databases. The document also provides a brief history of SQL and describes its main components like DDL, DML, and DCL. It provides examples of common SQL commands and functions. Finally, it discusses SQL Plus which is a basic Oracle utility used to interact with databases through a command line interface.
This document provides an overview of SQL (Structured Query Language) including what it is, what it can do, and some key SQL statements. SQL is a standard language for accessing and manipulating databases and allows users to retrieve, insert, update, and delete data. The document describes common statements like SELECT, UPDATE, DELETE, and INSERT and provides examples of basic usage.
Introduction to structured query language (sql)Sabana Maharjan
This document provides an introduction to structured query language (SQL). It discusses the two broad categories of SQL functions: data definition language and data manipulation language. The data definition language includes commands for creating database objects like tables and views, while the data manipulation language includes commands for inserting, updating, deleting, and retrieving data from tables. The document then covers topics like SQL data types, table structures, constraints, indexes, and basic data manipulation commands. It also discusses more advanced SQL concepts such as joins, aggregate functions, and views.
This document provides an overview of tools for PL/SQL development like Oracle SQL Developer and SQL*Plus. It also summarizes key SQL concepts including data definition, manipulation, retrieval, and security commands. Basic SQL elements such as constants, operators, conditions, data types, comments, and variables are also defined.
SQL is a language used to communicate with databases and manage data. It allows users to create, update, and retrieve data from databases. The document outlines the history of SQL and its evolution over time. It also describes key SQL concepts like data types, commands, primary keys, database normalization, and techniques for ensuring data integrity.
This document provides an overview of SQL programming including:
- A brief history of SQL and how it has evolved over time.
- Key SQL fundamentals like database structures, tables, relationships, and normalization.
- How to define and modify database structures using commands like CREATE, ALTER, DROP.
- How to manipulate data using INSERT, UPDATE, DELETE, and transactions.
- How to retrieve data using SELECT statements, joins, and other techniques.
- How to aggregate data using functions like SUM, AVG, MAX, MIN, and COUNT.
- Additional topics covered include subqueries, views, and resources for further learning.
This document provides an overview of structured query language (SQL) and basic database concepts. It defines common database terms like data, information, fields, records, tuples, attributes, and keys. It also describes SQL's data definition language for creating tables, data manipulation language for inserting, updating and deleting data, and transaction control language. The document outlines various SQL data types, constraints, operators and functions. It provides examples of SQL commands for creating tables, inserting data, querying with select statements, and ordering and grouping query results.
This document provides an overview of SQL (Structured Query Language). It discusses that SQL is used to define, manipulate, and control data in a relational database. It can define database schemas, insert, modify, retrieve, and delete data from databases. The document also provides a brief history of SQL and describes its main components like DDL, DML, and DCL. It provides examples of common SQL commands and functions. Finally, it discusses SQL Plus which is a basic Oracle utility used to interact with databases through a command line interface.
This document provides an overview of SQL (Structured Query Language) including what it is, what it can do, and some key SQL statements. SQL is a standard language for accessing and manipulating databases and allows users to retrieve, insert, update, and delete data. The document describes common statements like SELECT, UPDATE, DELETE, and INSERT and provides examples of basic usage.
SQL is a language used to store, manipulate, and retrieve data in relational database management systems. The core SQL commands are CREATE, SELECT, INSERT, UPDATE, and DELETE. CREATE is used to create new tables and objects. SELECT retrieves data from tables. INSERT adds new rows of data. UPDATE modifies existing data. DELETE removes rows of data. SQL allows users and applications to access data, define data structures, and manage data.
This document provides an overview of SQL and relational database concepts. It discusses how SQL is used to interact with relational database management systems like MySQL, including inserting and querying data. The summary also provides a brief history of SQL and explains some basic SQL syntax. Examples are given to demonstrate creating tables and relating data between tables to represent real-world entities and their relationships.
This document provides an introduction to SQL and relational database concepts. It explains that SQL is used to manipulate and retrieve data from relational databases. It also outlines the main SQL commands: DDL for data definition, DML for data manipulation, DCL for data control, and DQL for data queries. Key relational database concepts like tables, records, columns, and relationships are defined. Constraints, data types and integrity are discussed. Examples are provided for SQL statements like CREATE, INSERT, UPDATE, DELETE, and SELECT.
The document provides an introduction to the SQL language. It discusses the three main types of SQL statements: DDL, DML, and DCL. It also covers topics such as data types, constraints, functions, views, and how to create, modify and query tables. SQL is a language used to manage relational database management systems (RDBMS) and allows users to define, manipulate, and control access to data in a RDBMS.
Structured Query Language (SQL) is a standard language used to create, retrieve, and manage data in relational databases. SQL allows users to define tables, manipulate data within those tables through insert, update, delete statements, and retrieve data through select statements. SQL has different components including DDL for defining database structure, DML for manipulating data, DCL for controlling access, and TCL for managing transactions.
Introduction to the Structured Query Language SQLHarmony Kwawu
Our world depends on data in order to thrive. There are many different methods for storing data but the idea of relational database technology has proved the most advantageous. At the heart of all major relational database approach is the SQL, standing for Structured Query Language. SQL is based on set theory or relational principles.
SQL is a non-procedural language used to create, manipulate, and retrieve data from databases. It includes various data types, operators, and functions. The document outlines SQL concepts like datatypes, operators, database concepts, processing capabilities including DDL, DML, DCL and TCL statements. It also discusses joins, aggregate functions, stored procedures, indexes, and triggers.
The document discusses the concept of tables in databases and how to create tables in SQL. It defines what a table is, explains that tables can represent entities, relationships between entities, or lists. It then covers the syntax and rules for creating tables, including specifying the table name, columns, data types, constraints like primary keys, unique keys, foreign keys, default values and check constraints. Examples are provided for creating tables with different constraints. The roles of constraints in enforcing data integrity are also discussed.
This document discusses SQL and Oracle database concepts. It provides definitions of SQL, Oracle, and key Oracle data types. It also summarizes Oracle's object-relational capabilities and explains how to perform common data definition language (DDL) tasks like creating tables, adding constraints, and altering table structures in 3 sentences or less.
DDL(Data defination Language ) Using OracleFarhan Aslam
The document discusses DDL and DCL commands in Oracle including naming rules for objects, data types, creating tables, constraints, defining constraints, updating and violating constraints, creating tables using subqueries, altering tables, views, sequences, granting and revoking privileges, and dropping tables. It also discusses the Oracle data dictionary.
Consists of the explanations of the basics of SQL and commands of SQL.Helpful for II PU NCERT students and also degree studeents to understand some basic things.
This document provides an introduction to structured query language (SQL). It outlines the objectives of learning SQL, which are to use SQL for data administration and data manipulation. The agenda covers SQL concepts like data types, constraints, database relationships, queries, and commands. It discusses SQL database objects and how to retrieve, customize, group and join data. It also covers inserting, updating, deleting data and working with tables, views, constraints, stored procedures and functions.
Here are the SQL commands for the questions:
Q1: SELECT PNAME FROM PROJECT WHERE PLOCATION='Houston';
Q2: SELECT FNAME, LNAME FROM EMPLOYEE WHERE HOURS>20;
Q3: SELECT FNAME, LNAME FROM EMPLOYEE, DEPARTMENT WHERE MGRSSN=SSN;
This document provides an overview of SQL and database concepts through 20 pages. It discusses:
- The history and purpose of SQL as a standard language for operating on relational databases.
- Different SQL data types including numeric, date/time, and string types. It describes the allowed values and formats for each type.
- Key concepts in database management including the data definition language (DDL) for creating and modifying database structures, the data manipulation language (DML) for querying and modifying data, and different types of keys and constraints.
- Specific SQL commands like CREATE, DROP, INSERT, UPDATE, DELETE, and SELECT along with syntax and examples.
The document serves as an introduction and
This document provides information about SQL and database management systems. It discusses:
- SQL is a standard language for querying, manipulating, and defining data in databases. It was developed by IBM in the 1970s.
- SQL can be used to perform functions like retrieving data from a database, inserting new records, updating existing records, and deleting records.
- The main components of SQL are DDL, DML, DCL, and DQL which allow creating, modifying and deleting database structures, manipulating data, controlling access to data, and querying data respectively.
- Common SQL statements are discussed including SELECT, INSERT, UPDATE, DELETE, ALTER, CREATE TABLE, and DROP TABLE. Data types and
The document provides an introduction to SQL and database concepts. It defines key terms like data, information, fields, records, databases, tuples, attributes, primary keys, and foreign keys. It also describes SQL commands for creating tables, inserting data, querying data using conditions, sorting results, and using aggregate functions. Common data types and constraints in SQL are explained. Functions for mathematical operations, string manipulation and date/time are also listed.
The document provides information about Structured Query Language (SQL) including its basic concepts, data types, CREATE TABLE and INSERT commands, constraints, operators and data modifications. It defines key SQL concepts such as relations, attributes, tuples, primary keys, foreign keys and discusses SQL's capabilities for data definition, manipulation, queries and transaction control. Examples are given for creating a table and inserting records into the table.
The document discusses various SQL commands and concepts. It begins by defining SQL and explaining its purpose and architecture. It then covers the different types of SQL commands - DDL, DML, DCL, and TCL. Specific commands like CREATE, SELECT, INSERT, UPDATE and DELETE are discussed along with their uses. Data types like NUMBER, CHAR, VARCHAR, DATE and LONG are also explained. The document provides examples of creating a table and altering it using SQL statements.
SQL is a database sublanguage used to query and modify relational databases. It consists of two categories of statements: DDL (data definition language) used to define database schema objects like tables and indexes, and DML (data manipulation language) used to manipulate data within those objects. Oracle's SQL*Plus tool allows users to enter, edit, run and format SQL statements against an Oracle database. Common Oracle database objects include tables, views, indexes, triggers, and users. SQL statements like CREATE TABLE, ALTER TABLE, INSERT, UPDATE, DELETE and SELECT are used to define and manipulate data in database tables.
This document provides an overview of Structured Query Language (SQL) including its core components: Data Definition Language (DDL) for defining database schemas, Data Manipulation Language (DML) for querying and modifying data, and Data Control Language (DCL) for managing permissions and transactions. It describes SQL statements for creating tables, defining constraints, and querying data using SELECT statements. Examples are provided to illustrate concepts like joins, aliases, and pattern matching. Data types, NULL handling, and nested queries are also summarized.
SQL is a language used to store, manipulate, and retrieve data in relational database management systems. The core SQL commands are CREATE, SELECT, INSERT, UPDATE, and DELETE. CREATE is used to create new tables and objects. SELECT retrieves data from tables. INSERT adds new rows of data. UPDATE modifies existing data. DELETE removes rows of data. SQL allows users and applications to access data, define data structures, and manage data.
This document provides an overview of SQL and relational database concepts. It discusses how SQL is used to interact with relational database management systems like MySQL, including inserting and querying data. The summary also provides a brief history of SQL and explains some basic SQL syntax. Examples are given to demonstrate creating tables and relating data between tables to represent real-world entities and their relationships.
This document provides an introduction to SQL and relational database concepts. It explains that SQL is used to manipulate and retrieve data from relational databases. It also outlines the main SQL commands: DDL for data definition, DML for data manipulation, DCL for data control, and DQL for data queries. Key relational database concepts like tables, records, columns, and relationships are defined. Constraints, data types and integrity are discussed. Examples are provided for SQL statements like CREATE, INSERT, UPDATE, DELETE, and SELECT.
The document provides an introduction to the SQL language. It discusses the three main types of SQL statements: DDL, DML, and DCL. It also covers topics such as data types, constraints, functions, views, and how to create, modify and query tables. SQL is a language used to manage relational database management systems (RDBMS) and allows users to define, manipulate, and control access to data in a RDBMS.
Structured Query Language (SQL) is a standard language used to create, retrieve, and manage data in relational databases. SQL allows users to define tables, manipulate data within those tables through insert, update, delete statements, and retrieve data through select statements. SQL has different components including DDL for defining database structure, DML for manipulating data, DCL for controlling access, and TCL for managing transactions.
Introduction to the Structured Query Language SQLHarmony Kwawu
Our world depends on data in order to thrive. There are many different methods for storing data but the idea of relational database technology has proved the most advantageous. At the heart of all major relational database approach is the SQL, standing for Structured Query Language. SQL is based on set theory or relational principles.
SQL is a non-procedural language used to create, manipulate, and retrieve data from databases. It includes various data types, operators, and functions. The document outlines SQL concepts like datatypes, operators, database concepts, processing capabilities including DDL, DML, DCL and TCL statements. It also discusses joins, aggregate functions, stored procedures, indexes, and triggers.
The document discusses the concept of tables in databases and how to create tables in SQL. It defines what a table is, explains that tables can represent entities, relationships between entities, or lists. It then covers the syntax and rules for creating tables, including specifying the table name, columns, data types, constraints like primary keys, unique keys, foreign keys, default values and check constraints. Examples are provided for creating tables with different constraints. The roles of constraints in enforcing data integrity are also discussed.
This document discusses SQL and Oracle database concepts. It provides definitions of SQL, Oracle, and key Oracle data types. It also summarizes Oracle's object-relational capabilities and explains how to perform common data definition language (DDL) tasks like creating tables, adding constraints, and altering table structures in 3 sentences or less.
DDL(Data defination Language ) Using OracleFarhan Aslam
The document discusses DDL and DCL commands in Oracle including naming rules for objects, data types, creating tables, constraints, defining constraints, updating and violating constraints, creating tables using subqueries, altering tables, views, sequences, granting and revoking privileges, and dropping tables. It also discusses the Oracle data dictionary.
Consists of the explanations of the basics of SQL and commands of SQL.Helpful for II PU NCERT students and also degree studeents to understand some basic things.
This document provides an introduction to structured query language (SQL). It outlines the objectives of learning SQL, which are to use SQL for data administration and data manipulation. The agenda covers SQL concepts like data types, constraints, database relationships, queries, and commands. It discusses SQL database objects and how to retrieve, customize, group and join data. It also covers inserting, updating, deleting data and working with tables, views, constraints, stored procedures and functions.
Here are the SQL commands for the questions:
Q1: SELECT PNAME FROM PROJECT WHERE PLOCATION='Houston';
Q2: SELECT FNAME, LNAME FROM EMPLOYEE WHERE HOURS>20;
Q3: SELECT FNAME, LNAME FROM EMPLOYEE, DEPARTMENT WHERE MGRSSN=SSN;
This document provides an overview of SQL and database concepts through 20 pages. It discusses:
- The history and purpose of SQL as a standard language for operating on relational databases.
- Different SQL data types including numeric, date/time, and string types. It describes the allowed values and formats for each type.
- Key concepts in database management including the data definition language (DDL) for creating and modifying database structures, the data manipulation language (DML) for querying and modifying data, and different types of keys and constraints.
- Specific SQL commands like CREATE, DROP, INSERT, UPDATE, DELETE, and SELECT along with syntax and examples.
The document serves as an introduction and
This document provides information about SQL and database management systems. It discusses:
- SQL is a standard language for querying, manipulating, and defining data in databases. It was developed by IBM in the 1970s.
- SQL can be used to perform functions like retrieving data from a database, inserting new records, updating existing records, and deleting records.
- The main components of SQL are DDL, DML, DCL, and DQL which allow creating, modifying and deleting database structures, manipulating data, controlling access to data, and querying data respectively.
- Common SQL statements are discussed including SELECT, INSERT, UPDATE, DELETE, ALTER, CREATE TABLE, and DROP TABLE. Data types and
The document provides an introduction to SQL and database concepts. It defines key terms like data, information, fields, records, databases, tuples, attributes, primary keys, and foreign keys. It also describes SQL commands for creating tables, inserting data, querying data using conditions, sorting results, and using aggregate functions. Common data types and constraints in SQL are explained. Functions for mathematical operations, string manipulation and date/time are also listed.
The document provides information about Structured Query Language (SQL) including its basic concepts, data types, CREATE TABLE and INSERT commands, constraints, operators and data modifications. It defines key SQL concepts such as relations, attributes, tuples, primary keys, foreign keys and discusses SQL's capabilities for data definition, manipulation, queries and transaction control. Examples are given for creating a table and inserting records into the table.
The document discusses various SQL commands and concepts. It begins by defining SQL and explaining its purpose and architecture. It then covers the different types of SQL commands - DDL, DML, DCL, and TCL. Specific commands like CREATE, SELECT, INSERT, UPDATE and DELETE are discussed along with their uses. Data types like NUMBER, CHAR, VARCHAR, DATE and LONG are also explained. The document provides examples of creating a table and altering it using SQL statements.
SQL is a database sublanguage used to query and modify relational databases. It consists of two categories of statements: DDL (data definition language) used to define database schema objects like tables and indexes, and DML (data manipulation language) used to manipulate data within those objects. Oracle's SQL*Plus tool allows users to enter, edit, run and format SQL statements against an Oracle database. Common Oracle database objects include tables, views, indexes, triggers, and users. SQL statements like CREATE TABLE, ALTER TABLE, INSERT, UPDATE, DELETE and SELECT are used to define and manipulate data in database tables.
This document provides an overview of Structured Query Language (SQL) including its core components: Data Definition Language (DDL) for defining database schemas, Data Manipulation Language (DML) for querying and modifying data, and Data Control Language (DCL) for managing permissions and transactions. It describes SQL statements for creating tables, defining constraints, and querying data using SELECT statements. Examples are provided to illustrate concepts like joins, aliases, and pattern matching. Data types, NULL handling, and nested queries are also summarized.
SQL was designed at IBM Research to be a comprehensive database language for data definition, queries, and updates of relational databases. It uses terms like table, row, and column. The main command for data definition is CREATE, which can be used to create schemas, tables, domains, views, and other elements. Schemas group database objects and provide a namespace. A catalog is a collection of schemas. Integrity constraints like referential integrity are defined between relations within the same schema and catalog.
Les09 (using ddl statements to create and manage tables)Achmad Solichin
Using DDL Statements to Create and Manage Tables
The document discusses using DDL statements to create and manage database tables. It covers categorizing database objects like tables, views, indexes, and sequences. It also covers the syntax for creating tables, specifying column names and data types, creating constraints, and dropping tables. Examples are provided for creating a simple table, adding constraints, creating a table using a subquery, and altering or dropping existing tables.
The document discusses SQL commands and concepts. It begins by explaining the different types of SQL statements: Data Definition Language (DDL) for creating and modifying database objects, Data Manipulation Language (DML) for manipulating data, Data Retrieval Language (DRL) for querying data, Transaction Control Language (TCL) for managing transactions, and Data Control Language (DCL) for managing user access. It then provides examples of key DDL commands like CREATE, ALTER, and DROP TABLE and DML commands like INSERT, UPDATE, DELETE. It concludes by introducing aggregate functions in SQL like COUNT for summarizing data.
Using DDL Statements to Create and Manage Tables
This document discusses using data definition language (DDL) statements to create and manage database tables. It covers categorizing database objects like tables, views, and indexes; defining table structures with columns and data types; creating tables with the CREATE TABLE statement; adding constraints at table creation; and dropping tables with DROP TABLE. The key topics are creating simple tables, understanding available data types, defining columns and constraints, and using DDL statements like CREATE TABLE, ALTER TABLE, and DROP TABLE to manage tables.
This document provides an overview of SQL commands and concepts. It begins by defining SQL and its uses for manipulating and retrieving data from relational databases. It then covers the main SQL commands: DDL for schema definition, DML for data manipulation, DCL for security, and TCL for transactions. Common data types are also defined. The document proceeds to explain SQL syntax and components like keywords, identifiers, and clauses. Specific SQL commands like CREATE TABLE, ALTER TABLE, DROP TABLE, INSERT, UPDATE, DELETE, SELECT are described along with examples. Logical and comparison operators are defined. The WHERE clause for filtering rows is explained.
Structured Query Language
SQL Commands:
• The standard SQL commands to interact with relational databases are CREATE, SELECT, INSERT, UPDATE, DELETE and DROP
This document provides an overview of SQL commands and concepts. It begins by defining SQL and its purpose for manipulating data in relational database systems. It then covers the main SQL commands categorized as DDL, DML, DCL, and TCL. Examples are provided for commands like CREATE TABLE, ALTER TABLE, INSERT, UPDATE, DELETE, SELECT and more. Logical and comparison operators are also defined. The document concludes with examples of implementing SQL commands to interact with database tables.
Cursors allow data to be manipulated row-by-row in SQL PL procedures. There are two types of cursor data types: strongly-typed and weakly-typed. Strongly-typed cursors are associated with a row definition, while weakly-typed are not. Cursor variables can be declared locally in a procedure and used to fetch rows from a result set one at a time within a loop. Privileges are required to create cursor data types and declare cursor variables.
This document discusses how to create and manage database tables using SQL statements in Oracle. It covers topics such as naming rules for tables, the CREATE TABLE statement including specifying data types and constraints, accessing other users' tables, and making changes to existing tables using the ALTER TABLE statement. The goal is to teach how to categorize database objects, understand table structure, create tables with different constraints, and describe how schema objects work together.
This document provides an introduction and overview of SQL and database systems for a BAIS 3rd year class in 2015. It covers topics such as what SQL is, the functions and commands of SQL like SELECT, INSERT, UPDATE and DELETE. It also discusses database objects like tables, records, fields and columns. Specific SQL commands are defined for manipulating and querying database tables, including DDL, DML, DQL, DCL and TCL commands. Examples are provided for creating tables and inserting, updating and deleting records in MySQL.
This document discusses techniques for deterministic replay of multithreaded programs. It describes how recording shared memory ordering information can enable replay that reproduces data races and concurrency bugs. Specifically, it outlines using a directory-based approach to track read-write dependencies between threads and reduce the log size through transitive reduction of dependencies.
Multi-threaded processor architectures can improve parallelism at both the instruction-level and thread-level. Simultaneous multi-threading (SMT) allows multiple threads to issue and execute instructions simultaneously by dynamically sharing processor resources. SMT reduces underutilization of functional units and improves performance over multiprocessors. Multi-threaded designs are well-suited for digital signal processing applications that can benefit from parallel execution at multiple levels. Examples of multi-threaded real-time operating systems that support parallel DSP applications are discussed.
Recursion involves functions that call themselves during execution. This document discusses recursive functions like factorial, Fibonacci sequence, power, and printing patterns. Recursive functions have a base case that stops the recursion. The factorial function is defined recursively as n! = n * (n-1)!, and this recursive definition is evaluated step-by-step for fact(4). Recursive functions can also be used to define sequences like Fibonacci numbers.
The document provides an overview of business analytics (BA) including its history, types, examples, challenges, and relationship to data mining. BA involves exploring past business performance data to gain insights and guide planning. It can focus on the business as a whole or segments. Types of BA include descriptive analytics like reporting, affinity grouping, and clustering, as well as predictive analytics. Challenges to BA include acquiring high quality data and reacting to data quickly. Data mining is important for BA as it helps handle large datasets and specific problems.
The document discusses data mining and knowledge discovery from large data sets. It begins by defining the terms data, information, knowledge, and wisdom. It then explains that the growth of data from various sources has created a need for data mining to extract useful knowledge from large data repositories. Data mining involves non-trivial analysis of implicit patterns in large data sets. It is an interdisciplinary field that draws from areas like machine learning, statistics, database technology, and visualization. The goal is to transform data into actionable information through an iterative process of identifying problems, mining data, acting on results, and measuring impact.
The document discusses memory hierarchy and cache performance. It introduces the concept of memory hierarchy to get the best of fast and large memories. It then discusses different memory technologies like SRAM, DRAM and disk and their access times. It explains the basic concepts of direct mapped cache, cache hits, misses and different ways to reduce miss penalties like using multiple cache levels. Finally, it classifies cache misses into compulsory, capacity and conflict misses and how these are affected based on cache parameters.
- Decision trees are a supervised learning technique used for classification problems. They work by recursively splitting a dataset based on the values of predictor variables and assigning class labels to the terminal nodes.
- The document describes how decision trees are constructed by starting with the entire training set at the root node and then successively splitting the data into purer child nodes based on attribute values. Attribute selection at each node is done using an impurity-based heuristic like information gain.
This document discusses how Analysis Services caching works and provides strategies for warming the Storage Engine cache and Formula Engine cache. It explains that the Storage Engine handles data retrieval from disk while the Formula Engine determines which data is needed for queries. Caching can improve performance but requires consideration of memory usage, cache structures, and data granularity. The document recommends using the CREATE CACHE statement and running regular queries to pre-populate the caches, while being mindful of how security and non-deterministic elements can impact cache sharing and scoping. Automating cache warming through SQL Server Agent jobs or SSIS packages is suggested.
Optimizing shared caches in chip multiprocessorsJames Wong
Chip multiprocessors, which place multiple processors on a single chip, have become common in modern processors. There are different approaches to managing caches in chip multiprocessors, including private caches for each processor or shared caches. The optimal approach balances factors like interconnect traffic, duplication of data, load balancing, and cache hit rates.
The document discusses non-uniform cache architectures (NUCA), cache coherence, and different implementations of directories in multicore systems. It describes NUCA designs that map data to banks based on distance from the controller to exploit non-uniform access times. Cache coherence is maintained using directory-based protocols that track copies of cache blocks. Directories can be implemented off-chip in DRAM or on-chip using duplicate tag stores or distributing the directory among cache banks.
This document discusses abstract data types (ADTs) and their implementation in various programming languages. It covers the key concepts of ADTs including data abstraction, encapsulation, information hiding, and defining the public interface separately from the private implementation. It provides examples of ADTs implemented using modules in Modula-2, packages in Ada, classes in C++, generics in Java and C#, and classes in Ruby. Parameterized and encapsulation constructs are also discussed as techniques for implementing and organizing ADTs.
This document discusses the key concepts of object-oriented programming including abstraction, encapsulation, classes and objects. It defines abstraction as focusing on the essential characteristics of an object and hiding unnecessary details. Encapsulation hides the implementation of an object's methods and data within its class. A class defines both the data and behaviors of an object through its public interface and private implementation. Objects are instantiations of classes that come to life through constructors and die through destructors while maintaining data integrity.
The document proposes optimizing DRAM caches for latency rather than hit rate, as previous work had done. It presents the Alloy Cache design which avoids serializing tag and data accesses, keeping them in the same DRAM row for lower latency. Using a simple Memory Access Predictor (MAP), Alloy Cache can predict whether to use a higher-latency serial access model or lower-latency parallel model. With MAP, Alloy Cache outperforms previous designs like SRAM-tag caches with fewer optimizations that degrade performance. The document advocates revisiting DRAM cache designs given their different constraints compared to SRAM caches.
The document discusses the key elements of the object model, including abstraction, encapsulation, modularity, and hierarchy. It explains that abstraction is one of the fundamental ways to cope with complexity in software design. Abstraction focuses on the essential characteristics of an object that distinguish it from other objects, from the perspective of the viewer. The object model provides a conceptual framework for object-oriented programming that is based on these elements.
Abstract classes and interfaces allow for abstraction and polymorphism in object-oriented design. Abstract classes can contain both abstract and concrete methods, while interfaces only contain abstract methods. Abstract classes are used to provide a common definition for subclasses through inheritance, while interfaces define a contract for implementing classes to follow. Both support polymorphism by allowing subclasses/implementing classes to determine the specific implementation for abstract methods.
Object-oriented analysis and design (OOAD) emphasizes investigating requirements rather than solutions, and conceptual solutions that fulfill requirements rather than implementations. OOAD focuses on identifying domain concepts and defining software objects and how they collaborate. The Unified Process includes inception, elaboration, construction, and transition phases with iterations and milestones leading to final product releases.
The document discusses several programming paradigms including single process, multi process, and multi-core/multi-thread. It then covers topics such as processes, threads, synchronization, and liveness issues in concurrent programming including deadlock, starvation and livelock. Processes run independently while threads share data and scheduling. Synchronization prevents interference and inconsistencies between threads accessing shared data. Liveness issues can cause programs to halt indefinitely.
The document discusses abstract data types (ADTs), specifically queues. It defines a queue as a linear collection where elements are added to one end and removed from the other end, following a first-in, first-out (FIFO) approach. The key queue operations are enqueue, which adds an element, and dequeue, which removes the element that has been in the queue longest. Queues can be implemented using arrays or linked lists. Array implementations use head and tail pointers to track the start and end of the queue.
The document provides information on three programming languages: COBOL, LISP, and Python. COBOL was released in 1959 and was used for 80% of business transactions due to its reliability. LISP was the second high-level language created in 1958 and introduced innovations like garbage collection and recursion using linked lists. Python was developed in the 1990s and prioritizes readability through features like whitespace and a simple grammar.
This document discusses inheritance in object-oriented programming. It explains that inheritance allows a subclass to inherit attributes and behaviors from a superclass, extending the superclass. This allows for code reuse and the establishment of class hierarchies. The document provides an example of a BankAccount superclass and SavingsAccount subclass, demonstrating how the subclass inherits methods like deposit() and withdraw() from the superclass while adding its own method, addInterest(). It also discusses polymorphism and access control as related concepts.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
2. 2
Database Objects
An Oracle database consists of multiple
user accounts
Each user account owns database
objects
Tables
Views
Stored programs
Etc.
3. 3
Query: command to perform
operation on database object
Create
Modify
View
Delete
Structured Query Language (SQL)
Standard query language for
relational databases
Database Queries
4. 4
SQL Command Types
Data Definition Language (DDL)
Used to create and modify the structure of
database objects
Data Manipulation Language (DML)
Used to insert, update, delete, and view
database data
5. 5
DDL Commands
Used to create and modify the structure
of database objects
CREATE
ALTER
DROP
DDL commands execute as soon as
they are issued, and do not need to be
explicitly saved
6. 6
DML Commands
Used to insert, view, and modify database
data
INSERT
UPDATE
DELETE
SELECT
DDL commands need to be explicitly saved or
rolled back
COMMIT
ROLLBACK
7. 7
User Accounts
Each Oracle database user has a user
schema
Area in the database where the user’s
database objects are stored
Identified by a unique username and
protected by a password
Each user schema is granted specific
privileges
8. 8
Types of Database Privileges
System Privileges
Control the operations that the user can perform
within the database
Connecting to the database, creating new tables,
shutting down the database, etc.
Object Privileges
Granted on individual database objects
Controls operations that a user can perform on a
specific object (insert data, delete data, etc.)
When you create an object in your user schema,
you can then grant object privileges on that object
to other database users
9. 9
Oracle Naming Standard
Oracle database objects must adhere to
the Oracle Naming Standard
1 to 30 characters long
Must begin with a character
Can contain characters, numbers, and the
symbols $, _, and #
10. 10
Creating New User Accounts
Done by DBA
Syntax:
CREATE username IDENTIFIED BY password;
11. 11
Example Oracle System
Privileges
Privilege Leve
l
Purpose
CREATE SESSION User Connecting to database
CREATE TABLE User Creating tables in current user schema
DROP TABLE User Dropping tables in current user
schema
UNLIMITED
TABLESPACE
User Allows user to create schema objects
using as much space as needed
CREATE USER DBA Creating new users
GRANT ANY PRIVILEGE DBA Granting system privileges to users
CREATE ANY TABLE DBA Creating tables in any user schema
DROP ANY TABLE DBA Dropping tables in any user schema
13. 13
Database Roles
Role is a database object that can be
assigned system privileges
Role is then assigned to a user, and the
user inherits the role’s privileges
Used to easily assign groups of related
privileges to users
18. 18
Administering System
Privileges
To be able to grant system privileges to
other users, a user account must have
been granted the privilege WITH
ADMIN OPTION
19. 19
To create a table, you must
specify:
Table name
Field names
Field data types
Field sizes
Constraints
Defining Database Tables
20. 20
Must follow the Oracle Naming
Standard
Each table in a user schema must
have a unique name within that
user schema
Each field in a table must have a
unique name within that table
Table and Field Names
21. 21
Data type: specifies type of data
stored in a field
Date, character, number, etc.
Uses
Error checking
Efficient use of storage space
Oracle Data Types
22. 22
VARCHAR2
Variable-length character strings
Maximum of 4,000 characters
Must specify maximum width
allowed
No trailing blank spaces are added
Example declaration:
student_name VARCHAR2(30)
Oracle Character Data Types
23. 23
CHAR
Fixed-length character data
Maximum size 2000 characters
Must specify maximum width allowed
Adds trailing blank spaces to pad width
Example declaration:
student_gender CHAR(1)
Character Data Types
24. 24
NCHAR
Supports 16-digit binary character
codes
Used for alternate alphabets
Character Data Types
25. 25
NUMBER
stores values between 10-130
and 10126
General declaration format:
variable_name NUMBER(precision, scale)
Number Data Type
26. 26
Number type (integer, fixed point,
floating point) specified by
precision and scale
Precision: total number of digits on
either side of the decimal point
Scale: number of digits to right of
decimal point
NUMBER Data Types
27. 27
Whole number with no digits to
right of decimal point
Precision is maximum width
Scale is omitted
Sample declaration:
s_age NUMBER (2)
Integer Numbers
28. 28
Contain a specific number of
decimal places
Precision is maximum width
Scale is number of decimal places
Sample declaration:
item_price NUMBER(5, 2)
Fixed Point Numbers
29. 29
Contain a variable number of
decimal places
Precision and scale are omitted
Sample declaration:
s_GPA NUMBER
Floating Point Numbers
30. 30
DATE
Stores dates from 1/1/4712 BC to
12/31/4712 AD
Stores both a date and time component
Default date format:
DD-MON-YY HH:MI:SS AM
example: 05-JUN-03 12:00:00 AM
Sample declaration:
s_dob DATE
Date Date Type
31. 31
If no time value is given when a
new date is inserted, default value
is 12:00:00 AM
If no date value is given when a
new time is inserted, default date
is first day of current month
Specifying Date and Time
Values
32. 32
Large Object (LOB) Data
Types
Binary Large Object (BLOB)
Stores up to 4 GB of binary data
Character Large Object (CLOB)
Stores up to 4 GB of character data
BFILE
Stores a reference to a binary file maintained in
the operating system
NCLOB
Character LOB that supports 16-bit character code
33. 33
Declaring LOB Data Fields
Item size is not specified
Examples:
item_image BLOB
item_image BFILE
35. 35
Constraints
Rules that restrict the values that can
be inserted into a field
Types of constraints
Integrity: define primary and foreign keys
Value: specify values or ranges of values
that can be inserted
36. 36
Constraint Levels
Table constraint
Restricts the value of a field with respect to
all other table records
Example: primary key value must be
unique for each record
Column constraint
Restricts values in a specific column
Example: values in an S_GENDER field
must be ‘M’ or ‘F’
37. 37
Internal name used by DBMS to identify the
constraint
Each constraint name in a user schema
must be unique
If you do not name a constraint, the system
will automatically generate an unintuitive
name
Constraint Names
38. 38
Constraint naming convention:
tablename_fieldname_constraintID
Constraint ID values:
Primary key: pk
Foreign key: fk
Check condition: cc
Not NULL: nn
Unique: uk
Example constraint name:
my_students_s_id_pk
Constraint Names
43. 43
Table-level
Can only be defined after field is defined as a
primary key in another table
Syntax:
CONSTRAINT constraint_name
REFERENCES primary_key_table_name
(field_name)
Foreign Key Constraints
44. 44
Can be defined when field is declared
Foreign Key Constraints
45. 45
Can also be defined after all table field
definitions are completed
Foreign Key Constraints
46. 46
Column-level
Restricts data values that can be inserted
in a field
In general, avoid value constraints
because they make the database very
inflexible
Value Constraints
47. 47
Check condition: restricts to specific values
Example: s_gender (M or F)
CONSTRAINT my_students_s_gender_cc
CHECK (s_gender = ‘M’) OR (s_gender = ‘F’)
Not NULL: specifies that a field cannot be
NULL
Example:
CONSTRAINT my_students_s_dob_nn
NOT NULL
Types of Value Constraints
48. 48
Default: specifies a default value that is inserted
automatically
Example:
s_state CHAR(2) DEFAULT ‘WI’
Unique
Table constraint
Specifies that a non-primary key field must have a unique
value
CONSTRAINT consultant_c_email_uk UNIQUE (c_email)
Types of Value Constraints
49. 49
Oracle SQL command line utility for
issuing SQL commands
Starting SQL*Plus
SQL*Plus
50. 50
All commands must be terminated
with a semicolon
Use a text editor and copy and
paste commands
Character data is case sensitive
and must be in single quotes
‘M’
‘Sarah’
Using SQL*Plus
51. 51
Type exit at SQL> prompt
or
Click Close button on SQL*Plus
window
Exiting SQL*Plus
53. 53
Viewing a table’s structure
DESCRIBE table_name;
Viewing Table Information
54. 54
Oracle Data Dictionary
Contains tables that describe the database
structure
Is in the SYSTEM user schema
Is automatically updated as users create and
modify tables
Cannot be updated directly
Contains views that allow users to retrieve
information about the database structure
55. 55
Data Dictionary Views
Views present data in different formats
depending on the privileges of the user
USER: shows all objects belonging to the
current user
ALL: shows all objects belonging to the
current user, as well as objects current
user has privileges to manipulate
DBA: allows users with DBA privileges to
view objects of all database users
56. 56
Querying the Data Dictionary
Views
Syntax:
SELECT field1, field2, …
FROM privilege_viewname;
57. 57
Summary of Oracle
Data Dictionary Views
OBJECTS All database objects
TABLES Database tables
INDEXES Table indexes created to improve query
performance
VIEWS Database views
SEQUENCES Sequences created to automatically
generate surrogate key values
USERS Database users
CONSTRAINTS Table constraints
CONS_CONSTRAINT
S
Table columns that have constraints
IND_COLUMNS Indexed columns
TAB_COLUMNS All table columns
59. 59
Restricted actions
Dropping tables
Only allowed if table does not contain any fields that
are referenced as foreign keys, or if foreign key
constraints are dropped
Changing a column’s data specification
Only allowed if existing data is compatible with new
data specification
Decreasing column sizes
Only allowed if column does not contain any data
Adding constraints
Only allowed if existing data meets requirements of
new constraint
Modifying Tables
63. 63
Deleting Tables
Syntax to delete table if no table fields
are referenced as foreign keys:
DROP TABLE tablename;
Syntax to delete table and constraints if
table contains fields that are referenced
as foreign keys:
DROP TABLE tablename CASCADE CONSTRAINTS;