intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Using xml

Xem 1-20 trên 155 kết quả Using xml
  • Research indexing method based on R-tree method to increase the efficiency of XPath queries on XML data, through intermediate data converted into numerical coordinates of tags; use the method of converting XML structured text data into numeric data that can be represented on 2-dimensional space (can be extended to many dimensions).

    pdf26p capheviahe26 25-01-2021 19 4   Download

  • Bài giảng Cơ sở dữ liệu nâng cao - Chapter 4: Transferring data and using service broker. Nội dung chính trong chương này gồm có: Introduction, performing a bulk load, performing a bulk insert task, importing bulk XML data, overview of SQL server integration services, using the import/export wizard, service broker.

    ppt45p nomoney10 05-04-2017 74 9   Download

  • ProLiV - Animated Process-modeler of Complex (Computational) Linguistic Methods and Theories - is a fully modular, flexible, XML-based stand-alone Java application, used for computer-assisted learning in Natural Language Processing (NLP) or Computational Linguistics (CL).

    pdf4p hongphan_1 15-04-2013 59 4   Download

  • Globalization Support Features Globalization Support ensures that database utilities and error messages, sort order, date, time, monetary, numeric, and calendar conventions automatically adapt to the native language. Oracle currently supports 57 languages, 88 territories, 84 linguistic sorts (71 monolingual and 13 multilingual), and 235 encoded character sets. The language-dependent operations are controlled by a number of parameters and environment variables on both the client and the server sides. The server and the client may run in the same or different locations.

    ppt42p trinh02 28-01-2013 74 5   Download

  • After completing this lesson, you should be able to do the following: Describe the features of multitable inserts Use the following types of multitable inserts Unconditional INSERT Pivoting INSERT Conditional ALL INSERT Conditional FIRST INSERT Create and use external tables Name the index at the time of creating a primary key constraint

    ppt30p trinh02 28-01-2013 50 6   Download

  • After completing this lesson, you should be able to do the following: Use the Oracle tuning methodology to diagnose and resolve performance problems Use Oracle tools to diagnose performance problems Understand the goals of the workshop

    ppt14p trinh02 28-01-2013 69 5   Download

  • Data Loading Methods Several methods are available for loading data into tables in an Oracle database. Of the methods available, Direct Load insert and SQL*Loader are discussed here. Export and Import are covered in the Oracle9i Database Administration Fundamentals II course. SQL*Loader SQL*Loader loads data from external files into tables of an Oracle database. It has a powerful data parsing engine that places little limitation on the format of the data in the data file. Direct Load Direct Load insert can be used to copy data from one table to another table within the same database.

    ppt40p trinh02 28-01-2013 69 5   Download

  • After completing this lesson, you should be able to do the following: Set up Database Resource Manager Assign users to Resource Manager groups Create resource plans within groups

    ppt34p trinh02 28-01-2013 48 3   Download

  • After completing this lesson, you should be able to do the following: Write a multiple-column subquery Describe and explain the behavior of subqueries when null values are retrieved Write a subquery in a FROM clause Use scalar subqueries in SQL Describe the types of problems that can be solved with correlated subqueries Write correlated subqueries Update and delete rows using correlated subqueries Use the EXISTS and NOT EXISTS operators Use the WITH clause

    ppt36p trinh02 28-01-2013 51 5   Download

  • Oracle provides for easy and controlled privilege management through roles. Roles are named groups of related privileges that are granted to users or to other roles. They are designed to ease the administration of privileges in the database. Role characteristics Roles can be granted to and revoked from users with the same commands that are used to grant and revoke system privileges. Roles can be granted to any user or role. However, a role cannot be granted to itself and cannot be granted circularly. A role can consist of both system and object privileges.

    ppt28p trinh02 28-01-2013 45 3   Download

  • After completing this lesson, you should be able to do the following: Use the ROLLUP operation to produce subtotal values Use the CUBE operation to produce cross-tabulation values Use the GROUPING function to identify the row values created by ROLLUP or CUBE Use GROUPING SETS to produce a single result set

    ppt32p trinh02 28-01-2013 68 3   Download

  • After completing this lesson, you should be able to do the following: Define levels of locking Identify causes of contention Prevent locking problems Use Oracle utilities to detect lock contention Resolve contention in an emergency Resolve deadlock conditions

    ppt30p trinh02 28-01-2013 44 3   Download

  • After completing this lesson, you should be able to do the following: Create materialized views Refresh materialized views Create nested materialized views Create UNION ALL materialized views Explain the use of query rewrites Enable and control query rewrites

    ppt24p trinh02 28-01-2013 45 3   Download

  • After completing this lesson, you should be able use the following datetime functions: TZ_OFFSET CURRENT_DATE CURRENT_TIMESTAMP LOCALTIMESTAMP DBTIMEZONE SESSIONTIMEZONE EXTRACT FROM_TZ TO_TIMESTAMP TO_TIMESTAMP_TZ TO_YMINTERVAL

    ppt20p trinh02 28-01-2013 48 2   Download

  • Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.

    ppt20p trinh02 28-01-2013 81 3   Download

  • After completing this lesson, you should be able to do the following: Describe SET operators Use a SET operator to combine multiple queries into a single query Control the order of rows returned

    ppt24p trinh02 28-01-2013 46 3   Download

  • After completing this lesson, you should be able to do the following: Explain the role of the DBA in tuning applications Move tables using the ALTER TABLE command Redefine a table online Create different types of indexes Build and manage index-organized tables Explain and plan OLTP, DSS, and hybrid systems

    ppt38p trinh02 28-01-2013 62 4   Download

  • Data Integrity Data integrity means that data in a database adheres to business rules. There are three primary ways in which data integrity can be maintained: Application code Database triggers Declarative integrity constraints Mapping the business rules using one of the three methods is a design decision. The database administrator is primarily concerned with implementing the methods chosen by the designer and balancing the performance needs against integrity requirements.

    ppt34p trinh02 28-01-2013 51 5   Download

  • After completing this lesson, you should be able to do the following: Compare and evaluate the different storage structures Examine different data access methods Implement different partitioning methods

    ppt26p trinh02 28-01-2013 55 2   Download

  • After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and maintenance of the security model Use the GRANT and REVOKE statements to grant and revoke object privileges Create and access database links

    ppt26p trinh02 28-01-2013 47 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2