SlideShare a Scribd company logo
1 of 24
JAIPUR ENGINEERING COLLEGE, KUKAS, JAIPUR
DEPARTMENT OF Computer Science

SESSION 2011-2012

SEMINAR ON ORACLE
PRESENTED TO :
CS DEPARTMENT

PRESENTED BY :
Mayank Garg
CS08057
B.TECH IV Year / VII Sem
ORACLE
THE INFORMATION COMPANY
ORACLE : COMPANY PROFILE
Oracle Corporation is the world's second largest
independent software company.
 Oracle is the first software company to develop
and deploy 100 percent internet-enabled
enterprise software.
 Oracle's relational database was the world's first
to support the Structured Query Language, now
an industry standard.
 Oracle spends nearly 13% of their revenues for
research and development.

CONTINUE…
Today, the Oracle DBMS is supported on
over 80 different operating environments,
ranging from IBM mainframes and DEC VAX
minicomputers, to UNIX-based
minicomputers and Windows NT platforms.
 All 10 of the world's largest Web sites- from
Amazon.com to Yahoo! - use Oracle.
 65% of the Fortune 100 use Oracle for ebusiness

Controlling User Access
Database
administrator

Username and password
Privileges
Users
Privileges
• Database security:
– System security
– Data security

• System privileges: Gaining access to
the database
• Object privileges: Manipulating the
content of the database objects
• Schemas: Collections of objects, such
as tables, views, and sequences
System Privileges
• More than 100 privileges are
available.
• The database administrator has highlevel system privileges for tasks such
as:
– Creating new users
– Removing users
– Removing tables
– Backing up tables
Creating Users
The DBA creates users by using the
CREATE USER statement.
CREATE USER user
IDENTIFIED BY
password;

CREATE USER scott
IDENTIFIED BY
tiger;
User created.
User System Privileges
• Once a user is created, the DBA can
grant specific system privileges to a
GRANT privilege [, privilege...]
user.
TO user [, user| role, PUBLIC...];

• An application developer, for
example, may have the following
system privileges:
–
–
–
–
–

CREATE
CREATE
CREATE
CREATE
CREATE

SESSION
TABLE
SEQUENCE
VIEW
PROCEDURE
Granting System Privileges
The DBA can grant a user specific
system privileges.
GRANT

create session, create table,
create sequence, create view
TO
scott;
Grant succeeded.
What is a Role?

Users

Manager

Privileges
Allocating privileges
without a role

Allocating privileges
with a role
Creating and Granting Privileges to a Role

• Create a role
CREATE ROLE manager;
Role created.

• Grant privileges to a role
GRANT create table, create view
TO manager;
Grant succeeded.

• Grant a role to users
GRANT manager TO TRILOK, VARIS, ROHIT ;
Grant succeeded.
Changing Your Password
• The DBA creates your user account
and initializes your password.
• You can change your password by
using the ALTER USER statement.
ALTER USER scott
IDENTIFIED BY lion;
User altered.
Object Privileges
Object
Privilege
ALTER
DELETE

EXECUTE
INDEX
INSERT
REFERENCES
SELECT
UPDATE

Table

View

Sequence

Procedure
Object Privileges
• Object privileges vary from object to
object.
• An owner has all the privileges on the
object.
• An owner can give specific privileges
on that owner’s object.
GRANT
ON
TO
[WITH GRANT

object_priv [(columns)]
object
{user|role|PUBLIC}
OPTION];
Granting Object Privileges
• Grant query privileges on the
EMPLOYEES table.
GRANT select
ON
employees
TO
sue, rich;
Grant succeeded.

• Grant privileges to update specific
columns to users and roles.
GRANT update (department_name, location_id)
ON
departments
TO
scott, manager;
Grant succeeded.
Using the WITH GRANT OPTION and
PUBLIC Keywords

• Give a user authority to pass along
privileges.
GRANT select, insert
ON
departments
TO
scott
WITH
GRANT OPTION;
Grant succeeded.

• Allow all users on the system to query
data from Alice’s DEPARTMENTS
GRANT select
ON table.
alice.departments
TO
PUBLIC;
Grant succeeded.
How to Revoke Object Privileges
• You use the REVOKE statement to
revoke privileges granted to other
users.
• Privileges granted to others through
the WITH GRANT OPTION clause are
REVOKE {privilege [, privilege...]|ALL}
also revoked.
ON
object
FROM
{user[, user...]|role|PUBLIC}
[CASCADE CONSTRAINTS];
Revoking Object Privileges
As user Alice, revoke the SELECT and
INSERT privileges given to user Scott
on the DEPARTMENTS table.
REVOKE select, insert
ON
departments
FROM
scott;
Revoke succeeded.
Database Links
A database link connection allows local
users to access data on a remote
database.
Local

Remote
EMP Table

SELECT * FROM
emp@HQ_ACME.COM;

HQ_ACME.COM
database
Database Links
• Create the database link.
CREATE PUBLIC DATABASE LINK hq.acme.com
USING 'sales';
Database link created.

• Write SQL statements that use the
database link.
SELECT *
FROM emp@HQ.ACME.COM;
CREDITS
•
•
•
•

Website : http://www.oracle.com
http://www.wikepedia.com
Oracle Documentation
My own knowledge and experience
using Oracle
QUESTIONS
ANSWERS

More Related Content

Viewers also liked

Books -「キャズム」 ジェフリー・ムーア
Books  -「キャズム」 ジェフリー・ムーアBooks  -「キャズム」 ジェフリー・ムーア
Books -「キャズム」 ジェフリー・ムーアKatsuhito Okada
 
将来ビジョンを創造する方法 Step 1 アプローチ方法の転換
将来ビジョンを創造する方法 Step 1  アプローチ方法の転換将来ビジョンを創造する方法 Step 1  アプローチ方法の転換
将来ビジョンを創造する方法 Step 1 アプローチ方法の転換Nitta Tetsuya
 
Arquitectura Bioclimática para el Trópico Húmedo y la Plaza Comercial Bioclim...
Arquitectura Bioclimática para el Trópico Húmedo y la Plaza Comercial Bioclim...Arquitectura Bioclimática para el Trópico Húmedo y la Plaza Comercial Bioclim...
Arquitectura Bioclimática para el Trópico Húmedo y la Plaza Comercial Bioclim...Angela Stassano R.
 
将来ビジョンを創造する方法  Step2 イノベーションにチャレンジせよ!
将来ビジョンを創造する方法  Step2 イノベーションにチャレンジせよ!将来ビジョンを創造する方法  Step2 イノベーションにチャレンジせよ!
将来ビジョンを創造する方法  Step2 イノベーションにチャレンジせよ!Nitta Tetsuya
 
ServerLIFT 導入事例 (IIJグループ ネットケア様)
ServerLIFT 導入事例 (IIJグループ ネットケア様)ServerLIFT 導入事例 (IIJグループ ネットケア様)
ServerLIFT 導入事例 (IIJグループ ネットケア様)Nitta Tetsuya
 
SWoPP2010 LabeledFRT (2010/08/03)
SWoPP2010 LabeledFRT (2010/08/03)SWoPP2010 LabeledFRT (2010/08/03)
SWoPP2010 LabeledFRT (2010/08/03)Hiroya Nagao
 
20110513 柔軟な経路表:Flexible Routing Tables (FRT) (10分で雰囲気を/FRT-Chord無し)
20110513 柔軟な経路表:Flexible Routing Tables (FRT) (10分で雰囲気を/FRT-Chord無し)20110513 柔軟な経路表:Flexible Routing Tables (FRT) (10分で雰囲気を/FRT-Chord無し)
20110513 柔軟な経路表:Flexible Routing Tables (FRT) (10分で雰囲気を/FRT-Chord無し)Hiroya Nagao
 
Microsoft PowerPoint Web App アップロードテストスライド
Microsoft PowerPoint Web App アップロードテストスライドMicrosoft PowerPoint Web App アップロードテストスライド
Microsoft PowerPoint Web App アップロードテストスライドHiroya Nagao
 
図解で学ぶ 「BABOK」
図解で学ぶ 「BABOK」図解で学ぶ 「BABOK」
図解で学ぶ 「BABOK」Katsuhito Okada
 
IoT サービスのビジネスデザイン Part 3
IoT サービスのビジネスデザイン Part 3IoT サービスのビジネスデザイン Part 3
IoT サービスのビジネスデザイン Part 3Nitta Tetsuya
 
ChordアルゴリズムによるDHT入門
ChordアルゴリズムによるDHT入門ChordアルゴリズムによるDHT入門
ChordアルゴリズムによるDHT入門Hiroya Nagao
 
Уральский банк Сбербанка России. Абдурагимов Гасан. "Реализованный в Уральско...
Уральский банк Сбербанка России. Абдурагимов Гасан. "Реализованный в Уральско...Уральский банк Сбербанка России. Абдурагимов Гасан. "Реализованный в Уральско...
Уральский банк Сбербанка России. Абдурагимов Гасан. "Реализованный в Уральско...Expolink
 
「ゼロ・トゥ・ワン」日本発売記念講演とトークイベント
「ゼロ・トゥ・ワン」日本発売記念講演とトークイベント「ゼロ・トゥ・ワン」日本発売記念講演とトークイベント
「ゼロ・トゥ・ワン」日本発売記念講演とトークイベントTakayuki Yamazaki
 
IIBA日本支部 BABOK発表会 2014年5月
IIBA日本支部 BABOK発表会 2014年5月IIBA日本支部 BABOK発表会 2014年5月
IIBA日本支部 BABOK発表会 2014年5月Jun Ohnishi
 
Wireless charging of mobilephones using microwaves
Wireless charging of mobilephones using microwavesWireless charging of mobilephones using microwaves
Wireless charging of mobilephones using microwavesMayank Garg
 
Devlove LeanStartupNight インタビュー演習
Devlove LeanStartupNight インタビュー演習Devlove LeanStartupNight インタビュー演習
Devlove LeanStartupNight インタビュー演習Takashi Tsutsumi
 
CodeZineAcademy TDD実践講座PR資料
CodeZineAcademy TDD実践講座PR資料CodeZineAcademy TDD実践講座PR資料
CodeZineAcademy TDD実践講座PR資料Yasui Tsutomu
 
ギガビット無線機 Siklu の製品紹介 2016
ギガビット無線機 Siklu の製品紹介 2016ギガビット無線機 Siklu の製品紹介 2016
ギガビット無線機 Siklu の製品紹介 2016Nitta Tetsuya
 

Viewers also liked (19)

Books -「キャズム」 ジェフリー・ムーア
Books  -「キャズム」 ジェフリー・ムーアBooks  -「キャズム」 ジェフリー・ムーア
Books -「キャズム」 ジェフリー・ムーア
 
将来ビジョンを創造する方法 Step 1 アプローチ方法の転換
将来ビジョンを創造する方法 Step 1  アプローチ方法の転換将来ビジョンを創造する方法 Step 1  アプローチ方法の転換
将来ビジョンを創造する方法 Step 1 アプローチ方法の転換
 
Arquitectura Bioclimática para el Trópico Húmedo y la Plaza Comercial Bioclim...
Arquitectura Bioclimática para el Trópico Húmedo y la Plaza Comercial Bioclim...Arquitectura Bioclimática para el Trópico Húmedo y la Plaza Comercial Bioclim...
Arquitectura Bioclimática para el Trópico Húmedo y la Plaza Comercial Bioclim...
 
将来ビジョンを創造する方法  Step2 イノベーションにチャレンジせよ!
将来ビジョンを創造する方法  Step2 イノベーションにチャレンジせよ!将来ビジョンを創造する方法  Step2 イノベーションにチャレンジせよ!
将来ビジョンを創造する方法  Step2 イノベーションにチャレンジせよ!
 
ServerLIFT 導入事例 (IIJグループ ネットケア様)
ServerLIFT 導入事例 (IIJグループ ネットケア様)ServerLIFT 導入事例 (IIJグループ ネットケア様)
ServerLIFT 導入事例 (IIJグループ ネットケア様)
 
SWoPP2010 LabeledFRT (2010/08/03)
SWoPP2010 LabeledFRT (2010/08/03)SWoPP2010 LabeledFRT (2010/08/03)
SWoPP2010 LabeledFRT (2010/08/03)
 
20110513 柔軟な経路表:Flexible Routing Tables (FRT) (10分で雰囲気を/FRT-Chord無し)
20110513 柔軟な経路表:Flexible Routing Tables (FRT) (10分で雰囲気を/FRT-Chord無し)20110513 柔軟な経路表:Flexible Routing Tables (FRT) (10分で雰囲気を/FRT-Chord無し)
20110513 柔軟な経路表:Flexible Routing Tables (FRT) (10分で雰囲気を/FRT-Chord無し)
 
Microsoft PowerPoint Web App アップロードテストスライド
Microsoft PowerPoint Web App アップロードテストスライドMicrosoft PowerPoint Web App アップロードテストスライド
Microsoft PowerPoint Web App アップロードテストスライド
 
図解で学ぶ 「BABOK」
図解で学ぶ 「BABOK」図解で学ぶ 「BABOK」
図解で学ぶ 「BABOK」
 
IoT サービスのビジネスデザイン Part 3
IoT サービスのビジネスデザイン Part 3IoT サービスのビジネスデザイン Part 3
IoT サービスのビジネスデザイン Part 3
 
ChordアルゴリズムによるDHT入門
ChordアルゴリズムによるDHT入門ChordアルゴリズムによるDHT入門
ChordアルゴリズムによるDHT入門
 
Уральский банк Сбербанка России. Абдурагимов Гасан. "Реализованный в Уральско...
Уральский банк Сбербанка России. Абдурагимов Гасан. "Реализованный в Уральско...Уральский банк Сбербанка России. Абдурагимов Гасан. "Реализованный в Уральско...
Уральский банк Сбербанка России. Абдурагимов Гасан. "Реализованный в Уральско...
 
「ゼロ・トゥ・ワン」日本発売記念講演とトークイベント
「ゼロ・トゥ・ワン」日本発売記念講演とトークイベント「ゼロ・トゥ・ワン」日本発売記念講演とトークイベント
「ゼロ・トゥ・ワン」日本発売記念講演とトークイベント
 
IIBA日本支部 BABOK発表会 2014年5月
IIBA日本支部 BABOK発表会 2014年5月IIBA日本支部 BABOK発表会 2014年5月
IIBA日本支部 BABOK発表会 2014年5月
 
Collect, summarize and notify of OpenStack's log
Collect, summarize and notify of OpenStack's logCollect, summarize and notify of OpenStack's log
Collect, summarize and notify of OpenStack's log
 
Wireless charging of mobilephones using microwaves
Wireless charging of mobilephones using microwavesWireless charging of mobilephones using microwaves
Wireless charging of mobilephones using microwaves
 
Devlove LeanStartupNight インタビュー演習
Devlove LeanStartupNight インタビュー演習Devlove LeanStartupNight インタビュー演習
Devlove LeanStartupNight インタビュー演習
 
CodeZineAcademy TDD実践講座PR資料
CodeZineAcademy TDD実践講座PR資料CodeZineAcademy TDD実践講座PR資料
CodeZineAcademy TDD実践講座PR資料
 
ギガビット無線機 Siklu の製品紹介 2016
ギガビット無線機 Siklu の製品紹介 2016ギガビット無線機 Siklu の製品紹介 2016
ギガビット無線機 Siklu の製品紹介 2016
 

Similar to Oracle Database

Less06 users
Less06 usersLess06 users
Less06 usersImran Ali
 
Les14[1]Controlling User Access
Les14[1]Controlling User AccessLes14[1]Controlling User Access
Les14[1]Controlling User Accesssiavosh kaviani
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Oracle Database Security For Developers
Oracle Database Security For DevelopersOracle Database Security For Developers
Oracle Database Security For DevelopersSzymon Skorupinski
 
11g-sql-fundamentals-ppt.pdf
11g-sql-fundamentals-ppt.pdf11g-sql-fundamentals-ppt.pdf
11g-sql-fundamentals-ppt.pdffirasatsayyed1
 
Application express
Application expressApplication express
Application expressAntony Alex
 
SQL: Permissions and Data Protection
SQL: Permissions and Data ProtectionSQL: Permissions and Data Protection
SQL: Permissions and Data ProtectionLearnNowOnline
 
Thejaswy_profile _new
Thejaswy_profile _newThejaswy_profile _new
Thejaswy_profile _newThejaswy Ch
 
Oracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideOracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideCourtney Llamas
 
Presentation online application upgrade of oracle's bug db with edition-ba...
Presentation    online application upgrade of oracle's bug db with edition-ba...Presentation    online application upgrade of oracle's bug db with edition-ba...
Presentation online application upgrade of oracle's bug db with edition-ba...xKinAnx
 
Whats new in Autonomous Database in 2022
Whats new in Autonomous Database in 2022Whats new in Autonomous Database in 2022
Whats new in Autonomous Database in 2022Sandesh Rao
 
Granting Oracle Schema Permissions when Objects not created Yet
Granting Oracle Schema Permissions when Objects not created YetGranting Oracle Schema Permissions when Objects not created Yet
Granting Oracle Schema Permissions when Objects not created YetSecure-24
 
SQL PPT.pptx
SQL PPT.pptxSQL PPT.pptx
SQL PPT.pptxKulbir4
 

Similar to Oracle Database (20)

Less06 users
Less06 usersLess06 users
Less06 users
 
Les14[1]Controlling User Access
Les14[1]Controlling User AccessLes14[1]Controlling User Access
Les14[1]Controlling User Access
 
Less08 users
Less08 usersLess08 users
Less08 users
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
40020
4002040020
40020
 
40020
4002040020
40020
 
Rudhra
RudhraRudhra
Rudhra
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Oracle Database Security For Developers
Oracle Database Security For DevelopersOracle Database Security For Developers
Oracle Database Security For Developers
 
Apex ace update
Apex ace updateApex ace update
Apex ace update
 
11g-sql-fundamentals-ppt.pdf
11g-sql-fundamentals-ppt.pdf11g-sql-fundamentals-ppt.pdf
11g-sql-fundamentals-ppt.pdf
 
Application express
Application expressApplication express
Application express
 
SQL: Permissions and Data Protection
SQL: Permissions and Data ProtectionSQL: Permissions and Data Protection
SQL: Permissions and Data Protection
 
Thejaswy_profile _new
Thejaswy_profile _newThejaswy_profile _new
Thejaswy_profile _new
 
Oracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideOracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners Guide
 
Presentation online application upgrade of oracle's bug db with edition-ba...
Presentation    online application upgrade of oracle's bug db with edition-ba...Presentation    online application upgrade of oracle's bug db with edition-ba...
Presentation online application upgrade of oracle's bug db with edition-ba...
 
Whats new in Autonomous Database in 2022
Whats new in Autonomous Database in 2022Whats new in Autonomous Database in 2022
Whats new in Autonomous Database in 2022
 
Granting Oracle Schema Permissions when Objects not created Yet
Granting Oracle Schema Permissions when Objects not created YetGranting Oracle Schema Permissions when Objects not created Yet
Granting Oracle Schema Permissions when Objects not created Yet
 
SQL PPT.pptx
SQL PPT.pptxSQL PPT.pptx
SQL PPT.pptx
 
Praveen Kumar Resume
Praveen Kumar ResumePraveen Kumar Resume
Praveen Kumar Resume
 

More from Mayank Garg

Real time system in Multicore/Multiprocessor system
Real time system in Multicore/Multiprocessor systemReal time system in Multicore/Multiprocessor system
Real time system in Multicore/Multiprocessor systemMayank Garg
 
Max flow min cut
Max flow min cutMax flow min cut
Max flow min cutMayank Garg
 
Habits for computer
Habits for computerHabits for computer
Habits for computerMayank Garg
 
Presentation on green IT
Presentation on green ITPresentation on green IT
Presentation on green ITMayank Garg
 
Image attendance system
Image attendance systemImage attendance system
Image attendance systemMayank Garg
 
Cell phone operated land rover
Cell phone operated land roverCell phone operated land rover
Cell phone operated land roverMayank Garg
 
Broadband networking through human body
Broadband networking through human bodyBroadband networking through human body
Broadband networking through human bodyMayank Garg
 
Addressing Modes
Addressing ModesAddressing Modes
Addressing ModesMayank Garg
 

More from Mayank Garg (19)

Windows CE
Windows CEWindows CE
Windows CE
 
Real time system in Multicore/Multiprocessor system
Real time system in Multicore/Multiprocessor systemReal time system in Multicore/Multiprocessor system
Real time system in Multicore/Multiprocessor system
 
Max flow min cut
Max flow min cutMax flow min cut
Max flow min cut
 
3 g successor
3 g successor3 g successor
3 g successor
 
Habits for computer
Habits for computerHabits for computer
Habits for computer
 
Radar
RadarRadar
Radar
 
Presentation on green IT
Presentation on green ITPresentation on green IT
Presentation on green IT
 
DTH System
DTH SystemDTH System
DTH System
 
Image attendance system
Image attendance systemImage attendance system
Image attendance system
 
Electronic nose
Electronic noseElectronic nose
Electronic nose
 
Cell phone operated land rover
Cell phone operated land roverCell phone operated land rover
Cell phone operated land rover
 
Broadband networking through human body
Broadband networking through human bodyBroadband networking through human body
Broadband networking through human body
 
Mems paper
Mems paperMems paper
Mems paper
 
Stegnography
StegnographyStegnography
Stegnography
 
Addressing Modes
Addressing ModesAddressing Modes
Addressing Modes
 
8051 memory
8051 memory8051 memory
8051 memory
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Brain gate
Brain gateBrain gate
Brain gate
 
Database
DatabaseDatabase
Database
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Oracle Database

  • 1. JAIPUR ENGINEERING COLLEGE, KUKAS, JAIPUR DEPARTMENT OF Computer Science SESSION 2011-2012 SEMINAR ON ORACLE PRESENTED TO : CS DEPARTMENT PRESENTED BY : Mayank Garg CS08057 B.TECH IV Year / VII Sem
  • 3. ORACLE : COMPANY PROFILE Oracle Corporation is the world's second largest independent software company.  Oracle is the first software company to develop and deploy 100 percent internet-enabled enterprise software.  Oracle's relational database was the world's first to support the Structured Query Language, now an industry standard.  Oracle spends nearly 13% of their revenues for research and development. 
  • 4. CONTINUE… Today, the Oracle DBMS is supported on over 80 different operating environments, ranging from IBM mainframes and DEC VAX minicomputers, to UNIX-based minicomputers and Windows NT platforms.  All 10 of the world's largest Web sites- from Amazon.com to Yahoo! - use Oracle.  65% of the Fortune 100 use Oracle for ebusiness 
  • 6. Privileges • Database security: – System security – Data security • System privileges: Gaining access to the database • Object privileges: Manipulating the content of the database objects • Schemas: Collections of objects, such as tables, views, and sequences
  • 7. System Privileges • More than 100 privileges are available. • The database administrator has highlevel system privileges for tasks such as: – Creating new users – Removing users – Removing tables – Backing up tables
  • 8. Creating Users The DBA creates users by using the CREATE USER statement. CREATE USER user IDENTIFIED BY password; CREATE USER scott IDENTIFIED BY tiger; User created.
  • 9. User System Privileges • Once a user is created, the DBA can grant specific system privileges to a GRANT privilege [, privilege...] user. TO user [, user| role, PUBLIC...]; • An application developer, for example, may have the following system privileges: – – – – – CREATE CREATE CREATE CREATE CREATE SESSION TABLE SEQUENCE VIEW PROCEDURE
  • 10. Granting System Privileges The DBA can grant a user specific system privileges. GRANT create session, create table, create sequence, create view TO scott; Grant succeeded.
  • 11. What is a Role? Users Manager Privileges Allocating privileges without a role Allocating privileges with a role
  • 12. Creating and Granting Privileges to a Role • Create a role CREATE ROLE manager; Role created. • Grant privileges to a role GRANT create table, create view TO manager; Grant succeeded. • Grant a role to users GRANT manager TO TRILOK, VARIS, ROHIT ; Grant succeeded.
  • 13. Changing Your Password • The DBA creates your user account and initializes your password. • You can change your password by using the ALTER USER statement. ALTER USER scott IDENTIFIED BY lion; User altered.
  • 15. Object Privileges • Object privileges vary from object to object. • An owner has all the privileges on the object. • An owner can give specific privileges on that owner’s object. GRANT ON TO [WITH GRANT object_priv [(columns)] object {user|role|PUBLIC} OPTION];
  • 16. Granting Object Privileges • Grant query privileges on the EMPLOYEES table. GRANT select ON employees TO sue, rich; Grant succeeded. • Grant privileges to update specific columns to users and roles. GRANT update (department_name, location_id) ON departments TO scott, manager; Grant succeeded.
  • 17. Using the WITH GRANT OPTION and PUBLIC Keywords • Give a user authority to pass along privileges. GRANT select, insert ON departments TO scott WITH GRANT OPTION; Grant succeeded. • Allow all users on the system to query data from Alice’s DEPARTMENTS GRANT select ON table. alice.departments TO PUBLIC; Grant succeeded.
  • 18. How to Revoke Object Privileges • You use the REVOKE statement to revoke privileges granted to other users. • Privileges granted to others through the WITH GRANT OPTION clause are REVOKE {privilege [, privilege...]|ALL} also revoked. ON object FROM {user[, user...]|role|PUBLIC} [CASCADE CONSTRAINTS];
  • 19. Revoking Object Privileges As user Alice, revoke the SELECT and INSERT privileges given to user Scott on the DEPARTMENTS table. REVOKE select, insert ON departments FROM scott; Revoke succeeded.
  • 20. Database Links A database link connection allows local users to access data on a remote database. Local Remote EMP Table SELECT * FROM emp@HQ_ACME.COM; HQ_ACME.COM database
  • 21. Database Links • Create the database link. CREATE PUBLIC DATABASE LINK hq.acme.com USING 'sales'; Database link created. • Write SQL statements that use the database link. SELECT * FROM emp@HQ.ACME.COM;
  • 22. CREDITS • • • • Website : http://www.oracle.com http://www.wikepedia.com Oracle Documentation My own knowledge and experience using Oracle
  • 23.