⌘KCtrl+K 快速搜索

> 文章列表 / Page 325

2006-06-18

Materialized Views and Dimensions

Materialized Views and Refresh Types This practice will familiarize you with the various features and privileges to ensure successful creation of a materialized view from a base table. 1) Grant the ne...
#POST 11 MIN READ
2006-04-21

EVENT: 10231 "skip corrupted blocks on _table_scans_"

Event: 10231 Text: skip corrupted blocks on _table_scans_ ------------------------------------------------------------------------------- Cause: Action: Corrupt blocks are skipped in table scans, and ...
#POST 6 MIN READ
2006-04-19

DBMS_REPAIR example

PURPOSE This document provides an example of DBMS_REPAIR as introduced in Oracle 8i. Oracle provides different methods for detecting and correcting data block corruption - DBMS_REPAIR is one option. W...
#POST 31 MIN READ
2006-04-19

Setting an Oracle event:The structure of the trace syntax

PURPOSE ------- The purpose of this article is to explain briefly the structure of the syntax to event-based trace generation. Setting an event: The structure of the trace syntax ---------------------...
#POST 16 MIN READ
2006-02-26

Script to Collect RAC Diagnostic Information (racdiag.sql)

Script: -- NAME: RACDIAG.SQL -- SYS OR INTERNAL USER, CATPARR.SQL ALREADY RUN, PARALLEL QUERY OPTION ON -- ------------------------------------------------------------------------ -- AUTHOR: -- Michae...
#POST 47 MIN READ
2005-08-24

Know Oracle Date And Time Function

Oracle9i provides extended date and time support across different time zones with the help of new datetime data types and functions. To understand the working of these data types and functions, it is ...
#POST 37 MIN READ
2005-07-10

Rollback Segment Utilization:Extent, Wrap and Shrink

This practice will demonstrate the concept of extent, wrap and shrink in rollback segment utilization. You will: Use the create rollback segment and alter rollback segment syntax. Examine the V$ROLLST...
#POST 25 MIN READ
2005-07-10

Know about Oracle Network Security

Good network security is accomplished by utilizing port and protocol screening with routers, firewalls, and Intrusion Detection Systems.Port and protocol screening with routers, firewalls, and Intrusi...
#POST 31 MIN READ