Dropping Users Making Read-Only Tables Managing Default Users Marking Architectural Decisions NVARCHAR2 and NCHAR Oracle Certification
Implementing Virtual Columns- Tables and Constraints
A virtual column is based on one or more existing columns from the same table or a combination of constants, SQL functions, and user-defined PL/SQL functions or both. Virtual columns are not stored on disk; they are evaluated at runtime, when the SQL query executes. Virtual columns can be indexed and have stored statistics. Note […]NVARCHAR2 and NCHAR- Tables and Constraints
The NVARCHAR2 and NCHAR data types are useful if you have a database that was originally created with a single-byte, fixed-width character set, but sometime later you need to store multibyte character set data in the same database. You can use the NVARCHAR2 and NCHAR data types to support this requirement.When the database is created […]Character- Tables and Constraints
Use a character data type to store characters and string data. The following character data types are available in Oracle:• VARCHAR2• CHAR• NVARCHAR2 and NCHAR VARCHAR The VARCHAR2 data type is what you should use in most scenarios to hold character/ string data. A VARCHAR2 allocates space based only on the number or characters in […]Understanding Table Types- Tables and Constraints
The Oracle database supports a vast and robust variety of table types. These various types are described in Table 7-1. Table 7-1. Oracle Table Type Descriptions This chapter focuses on the table types that are most often used: heap organized, index organized, and temporary tables. Partitioned tables are used extensively in data warehouse environments and […]Schema Privileges- Users and Basic Security
New with 23c, you can now grant a schema to a user. This means all of the objects in the schema will be granted. This simplifies if new objects are added or modified, grants are based on a schema. New tables will be accessible without specifically granting access to that table. It is still recommended […]Assigning Database Object Privileges- Users and Basic Security
Database object privileges allow you to access and manipulate other users’ objects. The types of database objects to which you can grant privileges include tables, views, materialized views, sequences, packages, functions, procedures, user-defined types, directories, and now with 23c schemas. To be able to grant object privileges, one of the following must be true: • […]Managing Privileges- Users and Basic Security
A database user must be granted privileges before the user can perform any tasks in the database. In Oracle, you assign privileges either by granting a specific privilege to a user or by granting the privilege to a role and then granting the role that contains the privilege to a user. There are different types […]Profiles- Users and Basic Security
When you create users, requirements call for strong passwords and for the passwords to adhere to a set of security rules. You may want to ensure that a certain user is not capable of consuming inordinate amounts of CPU resources. These two examples can be done in database profiles. An Oracle profile is a database […]
Dropping Users Making Read-Only Tables Managing Default Users Marking Architectural Decisions NVARCHAR2 and NCHAR Oracle Certification