Skip Headers

Oracle® Database Concepts
10g Release 1 (10.1)

Part Number B10743-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Master Index
Master Index
Go to Feedback page
Feedback

Go to previous page
Previous
View PDF

Index

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y 

A

ABORT option
SHUTDOWN statement, 15.1.1.1
access control, 20.3.2
discretionary, definition, 1.2.7.1
fine-grained access control, 20.4.1
password encryption, 20.2.3.1
privileges, 20.3.2
roles, definition, 20.1.3
administrator privileges, 12.1.2
Advanced Queuing
event publication, 22.3.4.1
publish-subscribe support, 22.3.4.1
queue monitor process, 9.3.2.9, 9.3.2.9, 9.3.2.9
advisor framework, 14.2.4
advisors
Buffer Cache Advisor, 14.5
Logfile Size Advisor, 14.8.2
MTTR Advisor, 14.8.2
PGA Advisor, 14.5
Segment Advisor, 14.2.4, 14.6.6
Shared Pool Advisor, 14.5
SQL Access Advisor, 14.4
SQL Tuning Advisor, 14.2.4, 14.4
SQLAccess Advisor, 14.2.4
Undo Advisor, 14.2.4, 14.6.1
AFTER triggers, 22.3.2.2
defined, 22.3.2.2
when fired, 22.4.1
aggregate functions
user-defined, 27.4
alert file, 9.3.3
ARCn processes, 9.3.2.8
redo logs, 9.3.2.2
alert files
definition, 1.1.3.6
alias
qualifying subqueries (inline views), 5.3.7
ALL_ views, 7.2.2.2
ALL_UPDATABLE_COLUMNS view, 5.3.5
ALTER DATABASE statement, 12.2.2.2
BACKUP CONTROLFILE clause, 15.1.1.2.2
ALTER SESSION statement, 24.1.1.4
SET CONSTRAINTS DEFERRED clause, 21.5.2
transaction isolation level, 13.2.5.1
ALTER statement, 24.1.1.2
ALTER SYSTEM statement, 24.1.1.5
ARCHIVE ALL option
using to archive online redo logs, 15.1.1.2.1
dynamic parameters
LOG_ARCHIVE_MAX_PROCESSES, 9.3.2.8
ALTER TABLE statement
CACHE clause, 8.2.4.2
DEALLOCATE UNUSED clause, 2.3.4
disable or enable constraints, 21.6
MODIFY CONSTRAINT clause, 21.6.1
triggers, 22.2.1
validate or novalidate constraints, 21.6
ALTER USER statement
temporary segments, 2.4.3.3.1
American National Standards Institute (ANSI)
datatypes
conversion to Oracle datatypes, 26.8
ANALYZE statement
shared pool, 8.2.6.5
anonymous PL/SQL blocks, 24.2.1, 24.2.1.4.3
applications, 24.2.1.1.2
contrasted with stored procedures, 24.2.1.4.3
dynamic SQL, 24.2.1.2.4
performance, 24.2.1.4.3
ANSI SQL standard
datatypes of, 26.8
ANSI/ISO SQL standard
data concurrency, 13.1.1
isolation levels, 13.2.6.1
application administrators, 20.5.3.5
application context, 20.5.2
application developers
privileges for, 20.5.3.4.1
roles for, 20.5.3.4.1
applications
application triggers compared with database triggers, 22.1
can find constraint violations, 21.2.1.4
context, 20.4.2
data dictionary references, 7.2.1.3
data warehousing, 5.8.11.1
database access through, 9.1
dependencies of, 6.5.2
enhancing security with, 20.3.3, 21.2.1.1
object dependencies and, 6.5.2.3
online transaction processing (OLTP)
reverse key indexes, 5.8.10
processes, 9.2
program interface and, 9.6
roles and, 20.3.3.1.1
security
application context, 20.4.2
sharing code, 8.5
transaction termination and, 4.2
architecture
client/server, definition, 1.1.2.1
archive log files
definition, 1.1.3.4
archived redo logs
ALTER SYSTEM ARCHIVE ALL statement, 15.1.1.2.1
backups, 15.1.3.3
ARCHIVELOG mode
archiver process (ARCn) and, 9.3.2.8
archiver process (ARCn)
described, 9.3.2.8
multiple processes, 9.3.2.8
archiving
after inconsistent closed backups, 15.1.1.2.1
after online backups, 15.1.1.2.1
ALTER SYSTEM ARCHIVE ALL statement, 15.1.1.2.1
ARCn background process, 9.3.2.8
array processing, 24.1.5.2.8
arrays
size of VARRAYs, 27.2.2.1
variable (VARRAYs), 27.2.2.1
attributes
object types, 27.1.1, 27.2.1
AUDIT statement, 24.1.1.2
locks, 13.3.5.2
auditing
audit options, 20.6.1
audit records, 20.6.1.1
audit trails, 20.6.1.1
database, 20.6.1.1.1
operating system, 20.6.1.1.3, 20.6.1.1.5
database and operating-system user names, 20.2.1
described, 20.6
distributed databases and, 20.6.1.1.2
fine-grained, 20.4.3
policies for, 20.5.5
privilege use, 20.6.1
range of focus, 20.6.1
schema object, 20.6.1, 20.6.1
security and, 20.6.1.1.3
statement, 20.6.1
transaction independence, 20.6.1.1.6
when options take effect, 20.6.1.1.6
authentication
database administrators, 20.2.6
described, 20.2
multitier, 20.2.4
network, 20.2.2.1
operating system, 20.2.1
Oracle, 20.2.3
password policy, 20.5.3.1
public key infrastructure, 20.2.2.2
remote, 20.2.2.3
users, 20.5.1.2
Automatic Database Diagnostic Monitor, 14.3
automatic segment space management, 2.2.2
Automatic Storage Management, 14.11
benefits, 14.11.2
disk groups, 14.11, 14.11.1.1
Automatic Tuning Optimizer, 14.4
automatic undo management, 2.4.4, 14.6.1, 15.2.4.1.2
Automatic Workload Repository, 14.2.1

B

back-end of client/server architecture, 10.1
background processes, 9.3.2, 9.3.2
described, 9.3.2
diagrammed, 9.3.2
trace files for, 9.3.3
BACKUP CONTROLFILE clause
ALTER DATABASE statement, 15.1.1.2.2
backup mode, 15.1.3.1
backups
archived redo log, 15.1.3.3
consistent
whole database, 15.1.1.1
control file, 15.1.3.2
datafile, 15.1.2.3
inconsistent
whole database, 15.1.1.2, 15.1.1.2
logical, 15.3.4
online datafiles, 15.1.3.1
online tablespaces, 15.1.3.1
overview, 1.2.3
types listed, 1.2.3.2.4
whole database, 15.1.2.1
base tables
definition, 1.1.5.3
BEFORE triggers, 22.3.2.1
defined, 22.3.2.1
when fired, 22.4.1
BFILE datatype, 26.5.3
bigfile tablespaces, 1.1.4.1, 3.2.1
benefits, 3.2.1.1
considerations, 3.2.1.2
binary data
BFILEs, 26.5.3
BLOBs, 26.5.1
RAW and LONG RAW, 26.6
BINARY_DOUBLE datatype, 26.3.2.2
BINARY_FLOAT datatype, 26.3.2.1
bitmap indexes, 1.2.5.4, 5.8.11, 16.4
cardinality, 5.8.11.2
nulls and, 5.2.3, 5.8.11.4
parallel query and DML, 5.8.11.1, 16.4, 16.4
bitmap tablespace management, 3.2.7.1
bitmaps
to manage free space, 2.2.2
BLOBs (binary large objects), 26.5.1
blocking transactions, 13.2.6.1
block-level recovery, 13.3.4.1
blocks
anonymous, 24.2.1, 24.2.1.4.3
database, 2.2
BOOLEAN datatype, 26.1
branch blocks, 5.8.6.2
broker, 17.2.3.1.4
B-tree indexes, 5.8.6.2
compared with bitmap indexes, 5.8.11, 5.8.11.2
index-organized tables, 5.9
buff, 9.3.2.1
Buffer Cache Advisor, 14.5
buffer caches, 8.2.4
database, 8.2.4, 9.3.2.1
definition, 1.1.7.3.1
extended buffer cache (32-bit), 8.2.11.3
multiple buffer pools, 8.2.4.4
buffer pools, 8.2.4.4
BUFFER_POOL_KEEP initialization parameter, 8.2.4.4
BUFFER_POOL_RECYCLE initialization parameter, 8.2.4.4
buffers
database buffer cache
incremental checkpoint, 9.3.2.1
redo log, 8.2.5
redo log, definition, 1.1.7.3.2
business rules
enforcing in application code, 21.2.1
enforcing using stored procedures, 21.2.1
enforcing with constraints
advantages of, 21.2.1
byte semantics, 26.2.3

C

CACHE clause, 8.2.4.2
Cache Fusion, 13.2.4
caches
buffer, 8.2.4
multiple buffer pools, 8.2.4.4
cache hit, 8.2.4.1
cache miss, 8.2.4.1
data dictionary, 7.2.1.2, 8.2.6.4
location of, 8.2.6
database buffer, definition, 1.1.7.3.1
library cache, 8.2.6, 8.2.6.1, 8.2.6.4
object cache, 25.2.1, 25.2.4
object views, 27.6.2
private SQL area, 8.2.6.2
shared SQL area, 8.2.6, 8.2.6.2
calls
Oracle call interface, 9.6.1
cannot serialize access, 13.2.6.1
cardinality, 5.8.11.2
CASCADE actions
DELETE statements and, 21.3.4.3.2
century, 26.4.3
certificate authority, 20.2.2.2
chaining of rows, 2.2.2.2, 5.2.1.1
change data capture, 16.2.5, 23.3.1.4
CHAR datatype, 26.2.1
blank-padded comparison semantics, 26.2.1
character semantics, 26.2.3
character sets
CLOB and NCLOB datatypes, 26.5.2
column lengths, 26.2.3
NCHAR and NVARCHAR2, 26.2.4.2
check constraints, 21.3.5
checking mechanism, 21.4
defined, 21.3.5
multiple constraints on a column, 21.3.5.2
subqueries prohibited in, 21.3.5.1
checkpoint process (CKPT), 9.3.2.3
checkpoints
checkpoint process (CKPT), 9.3.2.3
control files and, 3.4.1
DBWn process, 9.3.2.1, 9.3.2.3
incremental, 9.3.2.1
statistics on, 9.3.2.3
CKPT background process, 9.3.2.3
client processes. See user processes
clients
in client/server architecture, definition, 1.1.2.1.1
client/server architectures, 10.1
definition, 1.1.2.1
diagrammed, 10.1
distributed processing in, 10.1
overview of, 10.1
program interface, 9.6
CLOB datatype, 26.5.2
clone databases
mounting, 12.2.2.3
cluster keys, 5.11
CLUSTER_DATABASE parameter, 12.2.2.1
clustered computer systems
Real Application Clusters, 12.1.1
clusters
cannot be partitioned, 18
definition, 1.1.5.4
dictionary locks and, 13.3.5.5
hash, 5.12
contrasted with index, 5.12
index
contrasted with hash, 5.12
indexes on, 5.8
cannot be partitioned, 18
keys, 5.11
affect indexing of nulls, 5.2.3
overview of, 5.11
rowids and, 5.2.1.2
scans of, 8.2.4.2
storage parameters of, 5.2.1
coalescing extents, 2.3.4.1
coalescing free space
extents
SMON process, 9.3.2.4
within data blocks, 2.2.2.1
collections, 27.2.2
index-organized tables, 5.9.1
key compression, 5.8.9.3
nested tables, 27.2.2.2
variable arrays (VARRAYs), 27.2.2.1
columns
cardinality, 5.8.11.2
column objects, 27.2.1.2.1
default values for, 5.2.4
described, 5.2
integrity constraints, 5.2, 5.2.4.1, 21.1.2.1, 21.3
maximum in concatenated indexes, 5.8.2
maximum in view or table, 5.3
nested tables, 5.2.6
order of, 5.2.1.3
prohibiting nulls in, 21.3.1
pseudocolumns
ROWID, 26.7.1
COMMENT statement, 24.1.1.2
COMMIT comment
deprecation of, 4.2.4.2
COMMIT statement, 24.1.1.3
ending a transaction, 4.1
fast commit, 9.3.2.2
implied by DDL, 4.1
two-phase commit, 4.2.5
committing transactions
defined, 4.1
fast commit, 9.3.2.2
group commits, 9.3.2.2
implementation, 9.3.2.2
comparison methods, 27.2.1.1.2
compiled PL/SQL
advantages of, 24.2.1.4.1
procedures, 24.2.1.4.3
pseudocode, 22.4.3
shared pool, 24.2.1.1.2
triggers, 22.4.3
complete recovery, 15.2.1.1
definition, 15.2.1.1
composite indexes, 5.8.2, 5.8.2
compression, index key, 5.8.9
concatenated indexes, 5.8.2, 5.8.2
concurrency
data, definition, 1.2.1.1
described, 13.1
limits on
for each user, 20.3.1.1.5
transactions and, 13.3.1
configuration of a database
process structure, 9.1.2
configurations
Data Guard, 17.2.3.1.1
configuring
parameter file, 12.1.3
process structure, 9.1
connection pooling, 20.2.4
connections
defined, 9.2.1
embedded SQL, 24.1.1.6
listener process and, 9.4.1.1, 10.3.2
restricting, 12.2.1.1
sessions contrasted with, 9.2.1
with administrator privileges, 12.1.2
consistency
read consistency, definition, 1.2.1.2
consistent backups
whole database, 15.1.1.1
constants
in stored procedures, 24.2.1.2.1
constraints
alternatives to, 21.2.1
applications can find violations, 21.2.1.4
CHECK, 21.3.5
default values and, 21.4.1
defined, 5.2
disabling temporarily, 21.2.1.6
effect on performance, 21.2.1.5
enforced with indexes, 5.8.3
PRIMARY KEY, 21.3.3.2
UNIQUE, 21.3.2.2
FOREIGN KEY, 21.3.4
integrity
types listed, 1.2.8.1
integrity, definition, 1.2.8.1
mechanisms of enforcement, 21.4
modifying, 21.6.1
NOT NULL, 21.3.1, 21.3.2.3
on views, 5.4.1
PRIMARY KEY, 21.3.3
referential
effect of updates, 21.3.4.3
self-referencing, 21.3.4.1
triggers cannot violate, 22.4
triggers contrasted with, 22.1.1.2
UNIQUE key, 21.3.2
partially null, 21.3.2.3
what happens when violated, 21.2
when evaluated, 5.2.4.1
constructor methods, 27.2.1.1.1
contention
for data
deadlocks, 13.3.2
lock escalation does not occur, 13.3.1.3
control files, 3.4
backups, 15.1.3.2
changes recorded, 3.4.1
checkpoints and, 3.4.1
contents, 3.4.1
definition, 1.1.3.2
how specified, 12.1.3
multiplexed, 3.4.2
overview, 3.4
used in mounting database, 12.2.2
converting data
program interface, 9.6
correlation names
inline views, 5.3.7
CPU time limit, 20.3.1.1.3
crash recovery
overview, 15.2.4.2
CREATE CLUSTER statement
storage parameters, 2.4.1
CREATE INDEX statement
storage parameters, 2.4.2
temporary segments, 2.4.3.1
CREATE PACKAGE statement
locks, 13.3.5.2
CREATE PROCEDURE statement
locks, 13.3.5.2
CREATE statement, 24.1.1.2
CREATE SYNONYM statement
locks, 13.3.5.2
CREATE TABLE statement
CACHE clause, 8.2.4.2
enable or disable constraints, 21.6
locks, 13.3.5.2
storage parameters, 2.4.1
triggers, 22.2.1
CREATE TEMPORARY TABLE statement, 5.2.7
CREATE TRIGGER statement
compiled and stored, 22.4.3
locks, 13.3.5.2
CREATE USER statement
temporary segments, 2.4.3.3.1
CREATE VIEW statement
locks, 13.3.5.2
cursors
creating, 24.1.5.2.1
defined, 24.1.2
definition, 1.1.7.3.4
embedded SQL, 24.1.1.6
maximum number of, 24.1.2
object dependencies and, 6.4
opening, 8.3.1.1.1, 24.1.2
private SQL areas and, 8.3.1.1.1, 24.1.2
recursive, 24.1.2
recursive SQL and, 24.1.2
scrollable, 24.1.2.1
stored procedures and, 24.2.1.2.2

D

dangling REFs, 27.2.1.5.2, 27.2.1.5.3
data
access to
concurrent, 13.1
fine-grained access control, 20.4.1
concurrency, definition, 1.2.1.1
consistency of
locks, 13.1.2
manual locking, 13.3.7
read consistency, definition, 1.2.1.2
repeatable reads, 13.2.3
transaction level, 13.2.3
underlying principles, 13.3
how stored in tables, 5.2.1
integrity of, 5.2, 21.1
CHECK constraints, 21.3.5
enforcing, 21.1.2, 21.2.1
referential, 21.1.1.4, 21.1.1.4
types, 21.1.1
locks on, 13.3.4
security of, 20.5.2
data blocks, 2.1
cached in memory, 9.3.2.1
coalescing free space in blocks, 2.2.2.1
controlling free space in, 2.2.3
definition, 1.1.4.2
format, 2.2.1
free lists and, 2.2.3.2.1
how rows stored in, 5.2.1.1
overview, 2.1
row directory, 5.2.1.1
shared in clusters, 5.11
shown in rowids, 26.7.2.1, 26.7.2.2
space available for inserted rows, 2.2.3.2.1
stored in the buffer cache, 8.2.4
writing to disk, 9.3.2.1
data conversion
program interface, 9.6
data definition language
definition, 1.3.1.1.1
described, 24.1.1.2
embedding in PL/SQL, 24.2.1.2.4
locks, 13.3.5
parsing with DBMS_SQL, 24.2.1.2.4
processing statements, 24.1.5.3
data dictionary
access to, 7.1.1
ALL prefixed views, 7.2.2.2
cache, 8.2.6.4
location of, 8.2.6
content of, 7.1, 8.2.6.4
datafiles, 3.2.2.1
DBA prefixed views, 7.2.2.3
defined, 7.1
dependencies tracked by, 6.1
dictionary managed tablespaces, 3.2.7.3
DUAL table, 7.2.2.4
dynamic performance tables, 7.3
locks, 13.3.5
owner of, 7.1.2
prefixes to views of, 7.2.2
public synonyms for, 7.2.1.1
row cache and, 8.2.6.4
structure of, 7.1.1
SYSTEM tablespace, 3.2.2.1, 7.1, 7.2.2
USER prefixed views, 7.2.2.1
uses of, 7.2
table and column definitions, 24.1.5.2.2
Data Guard
broker, 17.2.3.1.4
configurations, 17.2.3.1.1
logical standby databases, 17.2.3.1.3
physical standby databases, 17.2.3.1.2
data loading
with external tables, 5.2.8.2
data locks
conversion, 13.3.1.3
duration of, 13.3.1
escalation, 13.3.1.3
data manipulation language
definition, 1.3.1.1.2
described, 24.1.1.1
locks acquired by, 13.3.4.3
processing statements, 24.1.5.2
serializable isolation for subqueries, 13.2.7.2
triggers and, 1.2.8.3, 22.1.1, 22.4.2
data object number
extended rowid, 26.7.2.1
data protection
modes, 17.2.3.1.1
Data Pump Export, 11.2.1
dump file set, 11.2.1
Data Pump Import, 11.2.2
data security
definition, 1.2.7
data segments, 2.4.1, 5.2.1
definition, 1.1.4.4
data warehouse, 16.1.1.4
data warehousing
architecture, 16.1.3
bitmap indexes, 5.8.11.1
dimension schema objects, 5.5
ETL, 1.2.5.1
hierarchies, 5.5
invalidated views and packages, 6.2.1.3
materialized views, 1.2.5.3, 5.4
OLAP, 1.2.5.1
summaries, 5.4
database
staging, 16.1.1.4
database administrators
application administrator versus, 20.5.3.5
roles
for security, 20.5.3.3
security for, 20.5.3.3
security officer versus, 20.5.1
database administrators (DBAs)
authentication, 20.2.6
data dictionary views, 7.2.2.3
password files, 20.2.6
database buffers
after committing transactions, 4.2.1
buffer cache, 8.2.4
clean, 9.3.2.1
committing transactions, 9.3.2.2
defined, 8.2.4
definition, 1.1.7.3.1
dirty, 8.2.4.1, 9.3.2.1
free, 8.2.4.1
multiple buffer pools, 8.2.4.4
pinned, 8.2.4.1
size of cache, 8.2.4.3
writing of, 9.3.2.1
Database Creation Assistant, 14.1.1
database object metadata, 7.4
Database Resource Manager
introduction, 14.10.1
terminology, 14.10.1.1
database structures
control files, 3.4
data blocks, 2, 2.2
data dictionary, 7
datafiles, 3, 3.3
extents, 2.1, 2.3
memory, 8
processes, 9
revealing with rowids, 26.7.2.2
schema objects, 5.1
segments, 2.1, 2.4
tablespaces, 3, 3.2
database triggers, 22
Database Upgrade Assistant, 14.1.3
database writer process (DBWn), 9.3.2.1
checkpoints, 9.3.2.1
defined, 9.3.2.1
least recently used algorithm (LRU), 9.3.2.1
multiple DBWn processes, 9.3.2.1
when active, 9.3.2.1
write-ahead, 9.3.2.2
writing to disk at checkpoints, 9.3.2.3
databases
access control
password encryption, 20.2.3.1
clone database, 12.2.2.3
closing, 12.3.1
terminating the instance, 12.3.1.1
distributed
changing global database name, 8.2.6.5
incarnations, 15.2.1.2
limitations on usage, 20.3.1
mounting, 12.2.2
name stored in control file, 3.4.1
open and closed, 12.1.1
opening, 12.2.3
opening read-only, 12.2.3.4
password encryption, 20.5.3.1
production, 20.5.3.4.1, 20.5.3.5
scalability, 10.1, 16.5
shutting down, 12.3
standby, 12.2.2.2
starting up, 12.1
forced, 12.3.3.1
structures
control files, 3.4
data blocks, 2, 2.2
data dictionary, 7
datafiles, 3, 3.3
extents, 2.1, 2.3
logical, 2
memory, 8
processes, 9
revealing with rowids, 26.7.2.2
schema objects, 5.1
segments, 2.1, 2.4
tablespaces, 3, 3.2
test, 20.5.3.4.1
datafiles
backing up, 15.1.2.3
contents of, 3.3.1
data dictionary, 3.2.2.1
datafile 1, 3.2.2.1
SYSTEM tablespace, 3.2.2.1
definition, 1.1.3.1
in online or offline tablespaces, 3.3.3
named in control files, 3.4.1
online backups, 15.1.3.1
overview of, 3.3
read-only, 3.2.10
relationship to tablespaces, 3.1
shown in rowids, 26.7.2.1, 26.7.2.2
SYSTEM tablespace, 3.2.2.1, 3.2.2.1
taking offline, 3.3.3
temporary, 3.3.4
datatypes, 1.3.6, 26.1
ANSI, 26.8
array types, 27.2.2.1
BOOLEAN, 26.1
CHAR, 26.2.1
character, 26.2, 26.5.2
collections, 27.2.2
conversions of
by program interface, 9.6
non-Oracle types, 26.8
Oracle to another Oracle type, 26.11
DATE, 26.4
DB2, 26.8
how they relate to tables, 5.2
in PL/SQL, 26.1
list of available, 1.3.6, 26.1
LOB datatypes, 1.2.6.2, 26.5
BFILE, 26.5.3
BLOB, 26.5.1
CLOB and NCLOB, 26.5.2
LONG, 26.2.7
storage of, 5.2.1.3
multimedia, 27.1.2
NCHAR and NVARCHAR2, 26.2.4.2
nested tables, 5.2.6, 27.2.2.2
NUMBER, 26.3.1
object types, 27.2.1
RAW and LONG RAW, 26.6
ROWID, 26.7, 26.7.2
SQL/DS, 26.8
TIMESTAMP, 26.4.5
TIMESTAMP WITH LOCAL TIME ZONE, 26.4.5
TIMESTAMP WITH TIME ZONE, 26.4.5
URI, 26.10
user-defined, 27, 27.2
VARCHAR, 26.2.2.1
VARCHAR2, 26.2.2
XML, 26.9
DATE datatype, 26.4
arithmetic with, 26.4.2
changing default format of, 26.4
Julian dates, 26.4.1
midnight, 26.4
DATETIME datatypes, 26.4.4
daylight savings support, 26.4.4
DB_BLOCK_SIZE initialization parameter, 3.2.8, 8.2.4.3
DB_BLOCK_SIZE parameter
buffer cache, 8.2.4.3
DB_CACHE_SIZE initialization parameter, 8.2.1, 8.2.3, 8.2.4.3.1
DB_CACHE_SIZE parameter
buffer cache, 8.2.4.3
system global area size and, 8.2.1
DB_KEEP_CACHE_SIZE initialization parameter, 8.2.4.3, 8.2.4.4
DB_NAME parameter, 3.4.1
DB_nK_CACHE_SIZE initialization parameter, 8.2.4.3.1
DB_RECYCLY_CACHE_SIZE initialization parameter, 8.2.4.3, 8.2.4.4
DBA_ views, 7.2.2.3
DBA_UPDATABLE_COLUMNS view, 5.3.5
DBMS_LOCK package, 13.3.8
DBMS_RLS package
security policies, 20.4.1
DBMS_SCHEDULER package, 14.12
DBMS_SQL package, 24.2.1.2.4
parsing DDL statements, 24.2.1.2.4
DBWn background process, 9.3.2.1
DDL. See data definition language (DDL)
deadlocks
avoiding, 13.3.2.2
defined, 13.3.2
detection of, 13.3.2.1
distributed transactions and, 13.3.2.1
deallocating extents, 2.3.4, 2.3.4
decision support systems (DSS)
materialized views, 5.4
dedicated servers, 9.5
compared with shared servers, 9.4
default access driver
for external tables, 5.2.8.1
default tablespace
definition, 20.1.4.1
default temporary tablespaces, 3.2.5
specifying, 3.2.5.1
default values, 5.2.4, 5.2.4
constraints effect on, 21.4.1
deferred constraints
deferrable or nondeferrable, 21.5.1
initially deferred or immediate, 21.5.1
define phase of query processing, 24.1.5.2.5
degree of parallelism
parallel SQL, 16.5.1
delete cascade constraint, 21.3.4.3.2
DELETE statement, 24.1.1.1
foreign key references, 21.3.4.3.1
freeing space in data blocks, 2.2.2.1
triggers, 22.2.1
denormalized tables, 5.5
dependencies, 6
between schema objects, 6.1
function-based indexes, 5.8.5.3
local, 6.5.1
managing, 6
on non-existence of other objects, 6.3
Oracle Forms triggers and, 6.5.2.3
privileges and, 6.2.1.5
remote objects and, 6.5
shared pool and, 6.4
dereferencing, 27.2.1.5.3
implicit, 27.2.1.5.3
describe phase of query processing, 24.1.5.2.4
DETERMINISTIC functions
function-based indexes, 5.8.5.3.1
developers, application, 20.5.3.4.1
development languages, 25.1
dictionary cache locks, 13.3.6.2.1
dictionary managed tablespaces, 3.2.7.3
different-row writers block writers, 13.2.6.1
dimensions, 5.5
attributes, 5.5
hierarchies, 5.5
join key, 5.5
normalized or denormalized tables, 5.5
directory service
See also enterprise directory service.
dirty buffer, 8.2.4.1
incremental checkpoint, 9.3.2.1
dirty read, 13.1.1, 13.2.6.1
dirty write, 13.2.6.1
DISABLED indexes, 5.8.5.3.2, 5.8.5.3.3
discretionary access control, 20.1
definition, 1.2.7.1
disk affinities
disabling with large-scale clusters, 18.4.2
disk failure. See media failure
disk space
controlling allocation for tables, 5.2.1
datafiles used to allocate, 3.3, 3.3
dispatcher processes
described, 9.4.1.1
dispatcher processes (Dnnn)
limiting SGA space for each session, 20.3.1.1.5
listener process and, 9.4.1.1
network protocols and, 9.4.1.1
prevent startup and shutdown, 9.4.2
response queue and, 9.4.1
user processes connect through Oracle Net Services, 9.4, 9.4.1.1
distributed databases
auditing and, 20.6.1.1.2
client/server architectures and, 10.1
deadlocks and, 13.3.2.1
dependent schema objects and, 6.5
job queue processes, 9.3.2.7
recoverer process (RECO) and, 9.3.2.6
remote dependencies, 6.5.2
server can also be client in, 10.1
distributed processing environment
client/server architecture in, 10.1
data manipulation statements, 24.1.5.2
definition, 1.1.2.1
described, 10.1
materialized views (snapshots), 5.4
distributed SQL, 23.1, 23.2.1
distributed transactions
naming, 4.2.4
routing statements to nodes, 24.1.5.2.2
two-phase commit and, 4.2.5
DML. See data manipulation language (DML)
drivers, 9.6.2
DROP statement, 24.1.1.2
DROP TABLE statement
triggers, 22.2.1
DUAL table, 7.2.2.4
dynamic partitioning, 16.5.1
dynamic performance tables (V$ tables), 7.3
dynamic predicates
in security policies, 20.4.1.1
dynamic SQL
DBMS_SQL package, 24.2.1.2.4
embedded, 24.2.1.2.4

E

editing stored outlines, 24.1.6.1.2
embedded SQL, 24.1.1.6
dynamic SQL in PL/SQL, 24.2.1.2.4
encryption
database passwords, 20.5.3.1
enterprise directory service, 20.5.3.2
Enterprise Manager
ALERT file, 9.3.3
checkpoint statistics, 9.3.2.3
executing a package, 24.2.1.5
executing a procedure, 24.2.1.4
lock and latch monitors, 13.3.6
PL/SQL, 24.2.1.1.2
shutdown, 12.3, 12.3.3.1
SQL statements, 24.1
startup, 1.1.8.2, 12.2
statistics monitor, 20.3.1.2.2
Enterprise Manager Database Console, 14.1
enterprise roles, 20.5.3.2
enterprise users, 20.5.3.2
errors
in embedded SQL, 24.1.1.6
tracked in trace files, 9.3.3
ETL. See extraction, transformation, and loading (ETL), 1.2.5.2, 16.2
exceptions
during trigger execution, 22.4.1
raising, 24.2.1.2.3
stored procedures and, 24.2.1.2.3
exclusive locks
row locks (TX), 13.3.4.1
RX locks, 13.3.4.2.2
table locks (TM), 13.3.4.2
execution plans, 24.1.6.1
EXPLAIN PLAN, 24.1.1.1
location of, 8.2.6.2.1
parsing SQL, 24.1.5.2.2
EXPLAIN PLAN statement, 24.1.1.1
explicit locking, 13.3.7, 13.3.7
extended rowid format, 26.7.2.1
extents
allocating, 2.3.3
as collections of data blocks, 2.3
coalescing, 2.3.4.1
deallocation
when performed, 2.3.4, 2.3.4
defined, 2.1
definition, 1.1.4.3
dictionary managed, 3.2.7.3
incremental, 2.3.1
locally managed, 3.2.7.1
materialized views, 2.3.4.3
overview of, 2.3
external procedures, 24.2.1.4.6
external tables
parallel access, 5.2.8.3
extraction, transformation, and loading (ETL), 1.2.5.2, 16.2
overview, 1.2.5.2, 16.2

F

failures
database buffers and, 15.2.4.1
instance
recovery from, 12.2.3.1, 12.3.1.1
internal errors
tracked in trace files, 9.3.3
statement and process, 9.3.2.5
types listed, 1.2.3.1
fast commit, 9.3.2.2
fast refresh, 5.4.2
fast-start
rollback on demand, 15.2.4.1.2
features
new, 1.2.5.9, 16.8
fetching rows in a query, 24.1.5.2.9
embedded SQL, 24.1.1.6
file management locks, 13.3.6.2.2
files
ALERT and trace files, 9.3.2.2, 9.3.3
initialization parameter, 1.1.8.2, 12.1.3, 12.2.1
password, 20.2.6
administrator privileges, 12.1.2
server parameter, 1.1.8.2, 12.1.3, 12.2.1
filtering data
using Data Pump import, 11.2
FINAL and NOT FINAL types, 27.3.1
fine-grained access control, 20.4.1, 20.5.2
fine-grained auditing, 20.4.3
fixed views, 7.3
flash recovery area, 15.4
Flashback Query, 13.4
overview, 13.4
uses, 13.4.2
Flashback row history, 13.4
Flashback transaction history, 13.4
floating-point numbers
datatypes, 26.3.2
foreign key constraints
changes in parent key values, 21.3.4.3
constraint checking, 21.4
deleting parent table rows and, 21.3.4.3.2
maximum number of columns in, 21.3.4
nulls and, 21.3.4.2
updating parent key tables, 21.3.4.3
updating tables, 21.3.4.4.1, 21.3.4.4.2
fractional seconds, 26.4.5
free lists, 2.2.3.2.1
free space
automatic segment space management, 2.2.2
coalescing extents
SMON process, 9.3.2.4
coalescing within data blocks, 2.2.2.1
free lists, 2.2.3.2.1
managing, 2.2.2
section of data blocks, 2.2.1.6
free space management, 14.6.3
in-segment, 2.2.2
front-ends, 10.1
full table scans
LRU algorithm and, 8.2.4.2
parallel exe, 16.5.1
function-based indexes, 5.8.5
dependencies, 5.8.5.3
DISABLED, 5.8.5.3.2, 5.8.5.3.3
privileges, 5.8.5.3, 5.8.5.3.2
UNUSABLE, 5.8.5.3.3
functions
function-based indexes, 5.8.5
PL/SQL, 24.2.1.4, 24.2.1.4
contrasted with procedures, 24.2.1.4
DETERMINISTIC, 5.8.5.3.1
SQL
COUNT, 5.8.11.4
in CHECK constraints, 21.3.5.1
in views, 5.3.3.1
NVL, 5.2.3

G

Generic Connectivity, 23.1, 23.4.1
global database names
shared pool and, 8.2.6.5
global partitioned indexes
maintenance, 18.3.2.3
Globalization Development Kit, 1.3.7
globalization support
character sets for, 26.2.3
CHECK constraints and, 21.3.5.1
NCHAR and NVARCHAR2 datatypes, 26.2.4.2
NCLOB datatype, 26.5.2
views and, 5.3.3.1
GRANT statement, 24.1.1.2
locks, 13.3.5.2
GROUP BY clause
temporary tablespaces, 3.2.11
group commits, 9.3.2.2
guesses in logical rowids, 26.7.3
staleness, 26.7.3.2
statistics for, 26.7.3.2

H

handles for SQL statements, 8.3.1.1.1
definition, 1.1.7.3.4
hash clusters, 5.12
contrasted with index, 5.12
headers
of data blocks, 2.2.1.1
of row pieces, 5.2.1.1
HI_SHARED_MEMORY_ADDRESS parameter, 8.2.11.2
hierarchies, 5.5
join key, 5.5
levels, 5.5
high water mark
definition, 2.1
hot backups
inconsistent whole database backups, 15.1.1.2

I

immediate constraints, 21.5
implicit dereferencing, 27.2.1.5.3
incarnations
of databases, 15.2.1.2
incomplete media recovery
definition, 15.2.1.2
incomplete recovery, 15.2.1.2
inconsistent backups
whole database
definition, 15.1.1.2
incremental checkpoint, 9.3.2.1
incremental refresh, 5.4.2
index segments, 2.4.2
indexes, 5.8
bitmap indexes, 5.8.11, 5.8.11.5
nulls and, 5.2.3
parallel query and DML, 5.8.11.1
branch blocks, 5.8.6.2
B-tree structure of, 5.8.6.2
building
using an existing index, 5.8
cardinality, 5.8.11.2
cluster
cannot be partitioned, 18
composite, 5.8.2
concatenated, 5.8.2
definition, 1.1.5.2
described, 5.8
domain, 5.10
enforcing integrity constraints, 21.3.2.2, 21.3.3.2
extensible, 5.10
function-based, 5.8.5
dependencies, 5.8.5.3
DETERMINISTIC functions, 5.8.5.3.1
DISABLED, 5.8.5.3.3
optimization with, 5.8.5.2
privileges, 5.8.5.3, 5.8.5.3.2
index-organized tables, 5.9
logical rowids, 26.7.3
secondary indexes, 5.9.3
internal structure of, 5.8.6.2
key compression, 5.8.9
keys and, 5.8.3
primary key constraints, 21.3.3.2
unique key constraints, 21.3.2.2
leaf blocks, 5.8.6.2
location of, 5.8.6
LONG RAW datatypes prohibit, 26.6
nonunique, 5.8.1
nulls and, 5.2.3, 5.8.4, 5.8.11.4
on complex datatypes, 5.10
overview of, 5.8
partitioned tables, 5.8.11.5
partitions, 1.2.5.10, 17.2.2.2, 18.1
performance and, 5.8
reverse key indexes, 5.8.10
rowids and, 5.8.6.2
storage format of, 5.8.6.1
unique, 5.8.1
when used with views, 5.3.3.2
index-organized tables, 5.9
benefits, 5.9.1
key compression in, 5.8.9.3, 5.9.1
logical rowids, 26.7.3
secondary indexes on, 5.9.3
in-doubt transactions, 12.2.3.3
initialization parameter file, 1.1.8.2, 12.1.3, 12.2.1
startup, 1.1.8.2, 12.2.1
initialization parameters
basic, 14.1.4
BUFFER_POOL_KEEP, 8.2.4.4
BUFFER_POOL_RECYCLE, 8.2.4.4
CLUSTER_DATABASE, 12.2.2.1
DB_BLOCK_SIZE, 8.2.4.3
DB_CACHE_SIZE, 8.2.1, 8.2.4.3
DB_NAME, 3.4.1
HI_SHARED_MEMORY_ADDRESS, 8.2.11.2
LOCK_SGA, 8.2.11.1
LOG_ARCHIVE_MAX_PROCESSES, 9.3.2.8
LOG_BUFFER, 8.2.1, 8.2.5
MAX_SHARED_SERVERS, 9.4.1.2
NLS_NUMERIC_CHARACTERS, 26.3.1
OPEN_CURSORS, 8.3.1.1.1, 24.1.2
REMOTE_DEPENDENCIES_MODE, 6.5.2.1
SERVICE_NAMES, 10.3.2.1
SHARED_MEMORY_ADDRESS, 8.2.11.2
SHARED_POOL_SIZE, 8.2.1, 8.2.6
SHARED_SERVERS, 9.4.1.2
SKIP_UNUSABLE_INDEXES, 5.8.5.3.3
SORT_AREA_SIZE, 2.4.3.1
SQL_TRACE, 9.3.3
UNDO_MANAGEMENT, 12.2.3.2
USE_INDIRECT_DATA_BUFFERS, 8.2.11.3
initially deferred constraints, 21.5.1
initially immediate constraints, 21.5.1
INIT.ORA. See initialization parameter file.
inline views, 5.3.7
example, 5.3.7
INSERT statement, 24.1.1.1
free lists, 2.2.3.2.1
triggers, 22.2.1
BEFORE triggers, 22.3.2.1
instance failure
definition, 1.2.3.1
instance recovery
overview, 15.2.4.2
SMON process, 9.3.2.4
instances
associating with databases, 12.1.1, 12.2.2
definition, 1.1.7
described, 12.1
diagrammed, 9.3.2
memory structures of, 8.1
multiple-process, 9.1.1, 9.1.2
process structure, 9.1
recovery of, 12.3.1.1
opening a database, 12.2.3.1
SMON process, 9.3.2.4
restricted mode, 12.2.1.1
service names, 10.3.2
shutting down, 12.3, 12.3.3
starting, 1.1.8.2, 12.2
terminating, 12.3.1.1
Instant Client, 14.1.2
INSTEAD OF triggers, 22.3.3
nested tables, 27.6.4
object views, 27.6.3
integrity constraints, 21.1
default column values and, 5.2.4.1
definition, 1.2.8.1
types listed, 1.2.8.1
INTERNAL
security for, 20.5.3.3.2
internal errors tracked in trace files, 9.3.3
intrablock chaining, 5.2.1.1
IS NULL predicate, 5.2.3
ISO SQL standard, 26.8
isolation levels
choosing, 13.2.7
read committed, 13.2.5.2
setting, 13.2.5.1, 13.3.7

J

Java
attributes, 24.2.2.1.2
class hierarchy, 24.2.2.2
classes, 24.2.2.1.1
interfaces, 24.2.2.3
methods, 24.2.2.1.3
overview, 24.2.2
polymorphism, 24.2.2.4
triggers, 22, 22.2.3
Java Messaging Service, 24.2.2.7.6
Java stored procedures, 24.2.2.7.1
Java virtual machine, 24.2.2.5
JAVA_POOL_SIZE initialization parameter, 8.2.1
JDBC
overview, 24.2.2.7.3
job queue processes, 9.3.2.7
jobs, 9.1
join views, 5.3.5
joins
encapsulated in views, 5.3.2
views, 5.3.5

K

key compression, 5.8.9
keys
cluster, 5.11
defined, 21.3.2.1
foreign, 21.3.4, 21.3.4
in constraints, definition, 1.2.8.2
indexes and, 5.8.3
compression, 5.8.9
PRIMARY KEY constraints, 21.3.3.2
reverse key, 5.8.10
UNIQUE constraints, 21.3.2.2
maximum storage for values, 5.8.2
parent, 21.3.4, 21.3.4.1
primary, 21.3.3
referenced, 21.3.4
reverse key indexes, 5.8.10
unique, 21.3.2
composite, 21.3.2.1, 21.3.2.3

L

large pool, 8.2.7
LARGE_POOL_SIZE initialization parameter, 8.2.1
large-scale clusters
disk affinity, 18.4.2
large-scale clustes
multiple Oracle instances, 12.1.1
latches
described, 13.3.6.1
leaf blocks, 5.8.6.2
least recently used (LRU) algorithm
database buffers and, 8.2.4.1
dictionary cache, 7.2.1.2
full table scans and, 8.2.4.2
latches, 9.3.2.1
shared SQL pool, 8.2.6.2.1, 8.2.6.5
LGWR background process, 9.3.2.2
library cache, 8.2.6, 8.2.6.1, 8.2.6.4
listener process, 10.3.2
service names, 10.3.2
listeners, 9.4.1.1, 10.3.2
service names, 10.3.2
loader access driver, 5.2.8.1
LOB datatypes, 1.2.6.2, 26.5
BFILE, 26.5.3
BLOBs, 26.5.1
CLOBs and NCLOBs, 26.5.2
local indexes, 16.4
bitmap indexes
on partitioned tables, 5.8.11.5
parallel query and DML, 5.8.11.1
locally managed tablespaces, 3.2.7.1
LOCK TABLE statement, 24.1.1.1
LOCK_SGA parameter, 8.2.11.1
locking
indexed foreign keys and, 21.3.4.4.2
unindexed foreign keys and, 21.3.4.4.1
locks, 13.1.2
after committing transactions, 4.2.1
automatic, 13.3, 13.3.3
conversion, 13.3.1.3
data, 13.3.4
duration of, 13.3.1
deadlocks, 13.3.2, 13.3.2.1
avoiding, 13.3.2.2
dictionary, 13.3.5
clusters and, 13.3.5.5
duration of, 13.3.5.4
dictionary cache, 13.3.6.2.1
DML acquired, 13.3.4.3.2
diagrammed, 13.3.4.3
escalation does not occur, 13.3.1.3
exclusive table locks (X), 13.3.4.2.5
file management locks, 13.3.6.2.2
how Oracle uses, 13.3
internal, 13.3.6
latches and, 13.3.6.1
log management locks, 13.3.6.2.2
manual, 13.3.7
object level locking, 25.2.1
Oracle Lock Management Services, 13.3.8
overview of, 13.1.2
parse, 13.3.5.3, 24.1.5.2.2
rollback segment, 13.3.6.2.3
row (TX), 13.3.4.1
row exclusive locks (RX), 13.3.4.2.2
row share table locks (RS), 13.3.4.2.1
share row exclusive locks (SRX), 13.3.4.2.4
share table locks (S), 13.3.4.2.3
share-subexclusive locks (SSX), 13.3.4.2.4
subexclusive table locks (SX), 13.3.4.2.2
subshare table locks (SS), 13.3.4.2.1
table (TM), 13.3.4.2
table lock modes, 13.3.4.2
tablespace, 13.3.6.2.3
types of, 13.3.3
uses for, 1.2.1.3
log entries, 1.1.3.3, 15.2.4.1.1
See also redo log files, 1.1.3.3
log management locks, 13.3.6.2.2
log switch
archiver process, 9.3.2.8
log writer process (LGWR), 9.3.2.2
group commits, 9.3.2.2
redo log buffers and, 8.2.5
starting new ARCn processes, 9.3.2.8
system change numbers, 4.2.1
write-ahead, 9.3.2.2
LOG_ARCHIVE_MAX_PROCESSES parameter, 9.3.2.8
LOG_BUFFER initialization parameter, 8.2.1
LOG_BUFFER parameter, 8.2.5
system global area size and, 8.2.1
Logfile Size Advisor, 14.8.2
logical backups
overview, 15.3.4
logical blocks, 2.1
logical database structures
definition, 1.1.4
tablespaces, 3.2
logical reads limit, 20.3.1.1.4
logical rowids, 26.7.3
index on index-organized table, 5.9.3
physical guesses, 5.9.3, 26.7.3
staleness of guesses, 26.7.3.2
statistics for guesses, 26.7.3.2
logical standby databases, 17.2.3.1.3
LONG datatype
automatically the last column, 5.2.1.3
defined, 26.2.7
storage of, 5.2.1.3
LONG RAW datatype, 26.6
indexing prohibited on, 26.6
similarity to LONG datatype, 26.6
LRU, 8.2.4.1, 8.2.4.2, 9.3.2.1
dictionary cache, 7.2.1.2
shared SQL pool, 8.2.6.2.1, 8.2.6.5

M

maintenance window, 14.2.2
manual locking, 13.3.7
manual undo management, 15.2.4.1.2
map methods, 27.2.1.1.2
materialized view logs, 5.4.3
materialized views, 5.4
deallocating extents, 2.3.4.3
materialized view logs, 5.4.3
partitioned, 5.4, 18
refresh
job queue processes, 9.3.2.7
refreshing, 5.4.2
uses for, 16.3
MAX_SHARED_SERVERS parameter, 9.4.1.2
maximize availability, 17.2.3.1.1
maximize data protection, 17.2.3.1.1
maximize performance, 17.2.3.1.1
media failure
definition, 1.2.3.1
media recovery
complete, 15.2.1.1, 15.2.1.1
incomplete, 15.2.1.2
definition, 15.2.1.2
methods, 15.2.2
options, 15.2.1.2.2
overview, 15.2.1, 15.2.1.3, 15.2.1.3
using Recovery Manager, 15.2.2.1
using SQL*Plus, 15.2.2.2
memory
allocation for SQL statements, 8.2.6.5
content of, 8.1
cursors (statement handles), definition, 1.1.7.3.4
extended buffer cache (32-bit), 8.2.11.3
processes use of, 9.1
shared SQL areas, 8.2.6.2.1
software code areas, 8.5
stored procedures, 24.2.1.4.1
system global area (SGA)
allocation in, 8.2
initialization parameters, 8.2.11
locking into physical memory, 8.2.11.1
starting address, 8.2.11.2
MERGE statement, 24.1.1.1
message queuing
publish-subscribe support
event publication, 22.3.4.1
queue monitor process, 9.3.2.9
Messaging Gateway, 23.1
metadata
viewing, 7.4
methods
comparison methods, 27.2.1.1.2
constructor methods, 27.2.1.1.1
methods of object types, 27.2.1
map methods, 27.2.1.1.2
order methods, 27.2.1.1.2
purchase order example, 27.1.1, 27.2.1.1
MMAN process, 9.3.2.10
MMNL process, 9.3.2.10
MMON process, 9.3.2.10
mobile computing environment
materialized views, 5.4
modes
table lock, 13.3.4.2
monitoring user actions, 20.6
MTTR, 14.8.2
MTTR Advisor, 14.8.2
multiblock writes, 9.3.2.1
multimedia datatypes, 27.1.2
multiple-process systems (multiuser systems), 9.1.1
multiplexing
control files, 3.4.2
multithreaded server. See shared server
multiuser environments, 9.1.1
multiversion concurrency control, 13.2.2
mutating errors and triggers, 22.4.1

N

NCHAR datatype, 26.2.4.2
NCLOB datatype, 26.5.2
nested tables, 5.2.6, 27.2.2.2
index-organized tables, 5.9.1
key compression, 5.8.9.3
INSTEAD OF triggers, 27.6.4
updating in views, 27.6.4
network listener process
connection requests, 9.4, 9.4.1.1
networks
client/server architecture use of, 10.1
communication protocols, 9.6.2, 9.6.3
dispatcher processes and, 9.4, 9.4.1.1
drivers, 9.6.2
listener processes of, 9.4.1.1, 10.3.2
network authentication service, 20.2.2.1
Oracle Net Services, 10.3
NLS_DATE_FORMAT parameter, 26.4
NLS_NUMERIC_CHARACTERS parameter, 26.3.1
NOAUDIT statement, 24.1.1.2
locks, 13.3.5.2
nonprefixed indexes, 18.3.1
nonrepeatable reads, 13.2.6.1
nonunique indexes, 5.8.1
nonvolatile data, 16.1.1.3
NOREVERSE clause for indexes, 5.8.10
normalized tables, 5.5
NOT INSTANTIABLE types and methods, 27.3.2
NOT NULL constraints
constraint checking, 21.4
defined, 21.3.1
implied by PRIMARY KEY, 21.3.3.2
UNIQUE keys and, 21.3.2.3
NOVALIDATE con, 21.6
NOWAIT parameter
with savepoints, 4.2.3
nulls
as default values, 5.2.4
column order and, 5.2.1.3
converting to values, 5.2.3
defined, 5.2.3
foreign keys and, 21.3.4.2
how stored, 5.2.3
indexes and, 5.2.3, 5.8.4, 5.8.11.4
inequality in UNIQUE key, 21.3.2.3
non-null values for, 5.2.3
prohibited in primary keys, 21.3.3
prohibiting, 21.3.1
UNIQUE key constraints and, 21.3.2.3
unknown in comparisons, 5.2.3
NUMBER datatype, 26.3.1
internal format of, 26.3.1.1
rounding, 26.3.1
NVARCHAR2 datatype, 26.2.4.2
NVL function, 5.2.3

O

object cache
object views, 27.6.2
OCI, 25.2.1
Pro*C, 25.2.4
object identifiers
c, 5.8.9.3
collections
key compression, 5.9.1
object privileges, 20.3.2.2
object tables, 27.1.1, 27.2.1.2
row objects, 27.2.1.2.1
virtual object tables, 27.6
Object Type Translator (OTT)
overview, 25.2.3
object types, 27.1.1, 27.2.1
attributes of, 27.1.1, 27.2.1
column objects, 27.2.1.2.1
comparison methods for, 27.2.1.1.2
constructor methods for, 27.2.1.1.1
locking in cache, 25.2.1
methods of, 27.2.1
purchase order example, 27.1.1, 27.2.1.1
object views, 5.3.6
Oracle Type Translator, 25.2.3
purchase order example, 27.1.1
row objects, 27.2.1.2.1
object views, 5.3.6
advantages of, 27.6.1
modifiability, 22.3.3.1
nested tables, 27.6.4
updating, 27.6.3
use of INSTEAD OF triggers with, 27.6.3
OCBC, 25.3.1
OCCI
associative relational API, 25.2.2.1
navigational interface, 25.2.2.2
overview, 25.2.2
OCI, 9.6.1, 9.6.1
anonymous blocks, 24.2.1.1.2
bind variables, 24.1.5.2.6
OCIObjectFlush, 27.6.2
OCIObjectPin, 27.6.2
overview, 25.2.1
ODP.NET, 25.3.3
online redo logs
checkpoints, 3.4.1
online transaction processing (OLTP)
reverse key indexes, 5.8.10
OO4O, 25.3.2
OO4O Automation Server, 25.3.2.1
Open database connectivity, 25.3.1
OPEN_CURSORS parameter, 24.1.2
managing private SQL areas, 8.3.1.1.1
operating systems
authentication by, 20.2.1
block size, 2.2
communications software, 9.6.3
privileges for administrator, 12.1.2
roles and, 20.3.3.3
security in, 20.5.1.3
optimization
function-based indexes, 5.8.5.2
index build, 5.8
query rewrite
in security policies, 20.4.1.1
optimization of free space in data blocks, 2.2.2.1
optimizer, 24.1.6
Oracle
adherence to standards
integrity constraints, 21.2
client/server architecture of, 10.1
configurations of, 9.1, 9.1.2
multiple-process Oracle, 9.1.1, 9.1.2
instances, 12.1
processes of, 9.3
scalability of, 10.1
SQL processing, 24.1.5
Oracle blocks, 2.1
Oracle Call Interface See OCI
Oracle Certificate Authority, 20.2.2.2
Oracle code, 9.1, 9.6
Oracle Data Provider for .NET, 25.3.3
Oracle Data Pump API, 11.3
Oracle Enterprise Login Assistant, 20.2.2.2
Oracle Enterprise Manager. See Enterprise Manager
Oracle Enterprise Security Manager, 20.2.2.2
Oracle Forms
object dependencies and, 6.5.2.3
PL/SQL, 24.2.1.1.2
Oracle interMedia, 19.6
Oracle Internet Directory, 10.3.2.1, 20.2.2.2
Oracle Net Services, 10.3
client/server systems use of, 10.3
overview, 10.3
shared server requirement, 9.4, 9.4.1.1
Oracle Objects for OLE, 25.3.2
Oracle processes
definition, 1.1.7.6.2
Oracle program interface (OPI), 9.6.1, 9.6.1
Oracle Spatial, 19.7
Oracle Streams, 23.1, 23.3.1
Oracle Streams Advanced Queuing, 23.1
Oracle Text, 19.4, 19.5
Oracle Transparent Gateways, 23.1, 23.4.2
Oracle Ultra Search, 19.5
Oracle Wallet Manager, 20.2.2.2
Oracle wallets, 20.2.2.2
Oracle XA
session memory in the large pool, 8.2.7
Oracle-managed files, 14.6.2
ORBn process, 9.3.2.10
order methods, 27.2.1.1.2
OSMB process, 9.3.2.10
OTT. See Object Type Translator (OTT)

P

packages, 24.2.1.5
advantages of, 24.2.1.5.1
as program units, definition, 1.3.2.1
dynamic SQL, 24.2.1.2.4
executing, 24.2.1.1.2
for locking, 13.3.8
private, 24.2.1.5.1
public, 24.2.1.5.1
session state and, 6.2.1.4
shared SQL areas and, 8.2.6.3
pages, 2.1
parallel access
to external tables, 5.2.8.3
parallel DML
bitmap indexes, 5.8.11.1, 16.4
parallel execution, 1.2.5.6, 16.5
coordinator, 16.5.1
of table functions, 24.2.1.4.7
process classification, 18.4.2, 18.4.3
server, 16.5.1
servers, 16.5.1
tuning, 1.2.5.6, 16.5
parallel query
bitmap indexes, 5.8.11.1, 16.4
parallel SQL, 1.2.5.6, 16.5
coordinator process, 16.5.1
server processes, 16.5.1
parameter
server, 12.1.3
parameter files
definition, 1.1.3.5
parameters
initialization, 12.1.3
locking behavior, 13.3.3
storage, 2.2.3, 2.3.2
parse trees
construction of, 24.1.4
in shared SQL area, 8.2.6.2.1
parsing, 24.1.5.2.2
DBMS_SQL package, 24.2.1.2.4
embedded SQL, 24.1.1.6
parse calls, 24.1.4
parse locks, 13.3.5.3, 24.1.5.2.2
performed, 24.1.4
SQL statements, 24.1.5.2.2, 24.2.1.2.4
partitions, 1.2.5.10, 17.2.2.2, 18.1
bitmap indexes, 5.8.11.5
dynamic partitioning, 16.5.1
hash partitioning, 18.2.3
materialized views, 5.4, 18
nonprefixed indexes, 18.3.1
segments, 2.4.1, 2.4.2
passwords
account locking, 20.2.3.2
administrator privileges, 12.1.2
complexity verification, 20.2.3.4
connecting with, 9.2.1
connecting without, 20.2.1
database user authentication, 20.2.3
encrypted
database, 20.5.3.1
encryption, 20.2.3.1
password files, 20.2.6
password reuse, 20.2.3.3
security policy for users, 20.5.3.1
used in roles, 20.3.3
PCTFREE storage parameter
how it works, 2.2.3.1
PCTUSED and, 2.2.3.2.1
PCTUSED storage parameter
how it works, 2.2.3.2
PCTFREE and, 2.2.3.2.1
performance
constraint effects on, 21.2.1.5
dynamic performance tables (V$), 7.3
group commits, 9.3.2.2
index build, 5.8
packages, 24.2.1.5.1
resource limits and, 20.3.1
sort operations, 3.2.11
PGA Advisor, 14.5
PGA. See program global area (PGA)
PGA_AGGREGATE_TARGET initialization parameter, 8.3.3
phantom reads, 13.2.6.1
physical database structures
control files, 3.4
datafiles, 3.3
physical guesses in logical rowids, 26.7.3
staleness, 26.7.3.2
statistics for, 26.7.3.2
physical standby databases, 17.2.3.1.2
pipelined table functions, 24.2.1.4.7
PKI, 20.2.2.2
plan
SQL execution, 24.1.1.1, 24.1.5.2.2
PL/SQL, 24.2.1
anonymous blocks, 24.2.1, 24.2.1.4.3
auditing of statements within, 20.6.1.1.6
database triggers, 22
datatypes, 26.1
dynamic SQL, 24.2.1.2.4
exception handling, 24.2.1.2.3
executing, 24.2.1.1.2
external procedures, 24.2.1.4.6
gateway, 24.2.1.7
language constructs, 24.2.1.2
native execution, 24.2.1.1.2
object views, 27.6.2
overview of, 24.2.1
packages, 24.2.1.5
parse locks, 13.3.5.3
parsing DDL statements, 24.2.1.2.4
PL/SQL engine, 24.2.1.1.2
products containing, 24.2.1.1.2
program units, 8.2.6.3, 24.2.1, 24.2.1.3
compiled, 24.2.1.1.2, 24.2.1.4.3
shared SQL areas and, 8.2.6.3
stored procedures, 24.2.1, 24.2.1.4, 24.2.1.4
user locks, 13.3.8
PL/SQL Server Pages, 24.2.1.7
PMON background process, 9.3.2.5, 10.3.2.1
point-in-time recovery
clone database, 12.2.2.3
precompilers
anonymous blocks, 24.2.1.1.2, 24.2.1.1.2
bind variables, 24.1.5.2.6, 24.1.5.2.6
cursors, 24.1.5.2.1, 24.1.5.2.1
embedded SQL, 24.1.1.6, 24.1.1.6
predicates
dynamic
in security policies, 20.4.1.1
prefixes of data dictionary views, 7.2.2
PRIMARY KEY constraints, 21.3.3
constraint checking, 21.4
described, 21.3.3
indexes used to enforce, 21.3.3.2
name of, 21.3.3.2
maximum number of columns, 21.3.3.2
NOT NULL constraints implied by, 21.3.3.2
primary keys, 21.3.3.1
advantages of, 21.3.3.1
defined, 21.1.1.3
private SQL areas
cursors and, 8.3.1.1.1
described, 8.2.6.2
how managed, 8.3.1.1.1
privileges
administrator, 12.1.2
application developers and, 20.5.3.4.1
checked when parsing, 24.1.5.2.2
definition, 20.1.2
function-based indexes, 5.8.5.3, 5.8.5.3.2
overview of, 20.3.2
policies for managing, 20.5.3.1
revoked
object dependencies and, 6.2.1.5
roles, 20.3.3
schema object, 20.3.2.2
system, 20.3.2.1
to start up or shut down a database, 12.1.2
Pro*C Precompiler
overview, 25.2.4
Pro*C++ Precompiler
overview, 25.2.4
Pro*C/C++
processing SQL statements, 24.1.5.2
Pro*COBOL Precompiler, 25.4.1
Pro*FORTRAN Precompiler, 25.4.2
procedures, 24.2.1, 24.2.1.3, 24.2.1.4
advantages of, 24.2.1.4.1
contrasted with anonymous blocks, 24.2.1.4.3
contrasted with functions, 24.2.1.4
cursors and, 24.2.1.2.2
dependency tracking in, 6.2.1.2
executing, 24.2.1.1.2
external procedures, 24.2.1.4.6
INVALID status, 6.2.1.2
prerequisites for compilation of, 6.2.1
security enhanced by, 24.2.1.4.1
shared SQL areas and, 8.2.6.3
stored procedures, 24.2.1, 24.2.1.1.2, 24.2.1.4
process monitor process (PMON)
cleans up timed-out sessions, 20.3.1.1.5
described, 9.3.2.5
processes, 9.1
archiver (ARCn), 9.3.2.8
background, 9.3.2
diagrammed, 9.3.2
checkpoint (CKPT), 9.3.2.3
checkpoints and, 9.3.2.1
classes of parallel execution, 18.4.2, 18.4.3
dedicated server, 9.4.1.2
distributed transaction resolution, 9.3.2.6
job queue, 9.3.2.7
listener, 9.4.1.1, 10.3.2
shared servers and, 9.4
log writer (LGWR), 9.3.2.2
multiple-process Oracle, 9.1.1
Oracle, 9.3
Oracle, definition, 1.1.7.6.2
parallel execution coordinator, 16.5.1
parallel execution servers, 16.5.1
process monitor (PMON), 9.3.2.5
queue monitor (QMNn), 9.3.2.9
recoverer (RECO), 9.3.2.6
server, 9.3.1
dedicated, 9.5
shared, 9.4.1.1, 9.4.1.2
shadow, 9.5
shared server, 9.4
client requests and, 9.4.1
structure, 9.1
system monitor (SMON), 9.3.2.4
trace files for, 9.3.3
user, 9.2
recovery from failure of, 9.3.2.5
sharing server processes, 9.4.1.1
processing
DDL statements, 24.1.5.3
distributed, definition, 1.1.2.1
DML statements, 24.1.5.2
overview, 24.1.5
parallel SQL, 1.2.5.6, 16.5
queries, 24.1.5.2.3
profiles
user, definition, 20.1.4.4
when to use, 20.3.1.2.1
program global area (PGA), 8.3
definition
shared server, 9.4.1.2
shared servers, 9.4.1.2
program interface, 9.6
Oracle side (OPI), 9.6.1
structure of, 9.6.1
user side (UPI), 9.6.1
program units, 24.2.1, 24.2.1.3
prerequisites for compilation of, 6.2.1
shared pool and, 8.2.6.3
protection modes, 17.2.3.1.1
pseudocode
triggers, 22.4.3
pseudocolumns
CHECK constraints prohibit
LEVEL and ROWNUM, 21.3.5.1
modifying views, 22.3.3.2
ROWID, 26.7.1
PSP. See PL/SQL Server Pages
public key infrastructure, 20.2.2.2
publication
DDL statements, 22.3.4.4.2
DML statements, 22.3.4.4.3
logon/logoff events, 22.3.4.4.1
system events
server errors, 22.3.4.3
startup/shutdown, 22.3.4.3
using triggers, 22.3.4
publish-subscribe support
event publication, 22.3.4.1
triggers, 22.3.4
purchase order example
object types, 27.1.1

Q

queries
composite indexes, 5.8.2
default locking of, 13.3.4.3.1
define phase, 24.1.5.2.5
describe phase, 24.1.5.2.4
fetching rows, 24.1.5.2.3
in DML, 24.1.1.1
inline views, 5.3.7
merged with view queries, 5.3.3
parallel processing, 1.2.5.6, 16.5
phases of, 13.2.1
processing, 24.1.5.2.3
read consistency of, 13.2.2
stored as views, 5.3
temporary segments and, 2.4.3.1, 24.1.5.2.3
triggers use of, 22.4.2
query rewrite
dynamic predicates in security policies, 20.4.1.1
queue monito, 9.3.2.9
queuing
publish-subscribe support
event publication, 22.3.4.1
queue monitor process, 9.3.2.9
quiesce database, 13.2.7.3
uses for, 1.2.1.4
quotas
tablespace, definition, 20.1.4.3

R

RADIUS, 20.2.2.3
RAW datatype, 26.6
RBAL process, 9.3.2.10
read committed isolation, 13.2.5.2
read consistency, 13.1.1, 13.2.1
Cache Fusion, 13.2.4
definition, 1.2.1.2
dirty read, 13.1.1, 13.2.6.1
multiversion consistency model, 13.2.1
nonrepeatable read, 13.2.6.1
phantom read, 13.2.6.1
queries, 13.2.1, 24.1.5.2.3
Real Application Clusters, 13.2.4
statement level, 13.2.2
subqueries in DML, 13.2.7.2
transactions, 13.2.1, 13.2.3
triggers and, 22.4, 22.4.2
read snapshot time, 13.2.6.1
read uncommitted, 13.1.1
readers block writers, 13.2.6.1
read-only
databases
opening, 12.2.3.4
tablespaces, 3.2.10
transactions, definition, 1.2.1.2.2
reads
data block
limits on, 20.3.1.1.4
dirty, 13.1.1
repeatable, 13.2.3
Real Application Clusters
databases and instances, 12.1.1
isolation levels, 13.2.6.3
mounting a database using, 12.2.2.1
read consistency, 13.2.4
reverse key indexes, 5.8.10
system change numbers, 9.3.2.2
system monitor process and, 9.3.2.4
temporary tablespaces, 3.2.11
recoverer process (RECO), 9.3.2.6
in-doubt transactions, 4.2.5, 12.2.3.3
recovery
basic steps, 15.2.4.1.2
block-level recovery, 13.3.4.1
complete, 15.2.1.1
crash, 15.2.4.2
database buffers and, 15.2.4.1
distributed processing in, 9.3.2.6
general overview, 1.2.3
incomplete, 15.2.1.2
instance, 15.2.4.2
instance failure, 12.3.1.1, 12.3.1.1
instance recovery
SMON process, 9.3.2.4
media, 15.2.1.3, 15.2.1.3
media recovery
dispatcher processes, 9.4.2
methods, 15.2.2
of distributed transactions, 12.2.3.3
opening a database, 12.2.3.1, 12.2.3.1
overview of, 15.2.4.1
point-in-time
clone database, 12.2.2.3
process recovery, 9.3.2.5
required after terminating instance, 12.3.1.1, 12.3.1.1
rolling back transactions, 15.2.4.1.2
rolling forward, 15.2.4.1.1
SMON process, 9.3.2.4
tablespace
point-in-time, 15.2.1.2.1
transaction, 15.2.4.1.2
types, 15.2.1.2.2
using Recovery Manager, 15.2.2.1
using SQL*Plus, 15.2.2.2
Recovery Manager, 14.8.1
recursive SQL
cursors and, 24.1.2
redo log buffers
definition, 1.1.7.3.2
redo logs, 15.2.4.1.1
archiver process (ARCn), 9.3.2.8
buffer management, 9.3.2.2
buffers, 8.2.5
circular buffer, 9.3.2.2
committed data, 15.2.4.1, 15.2.4.1.1
committing a transaction, 9.3.2.2
definition, 1.2.3.2.1
entries, 15.2.4.1.1
files named in control file, 3.4.1
log sequence numbers
recorded in control file, 3.4.1
log switch
archiver process, 9.3.2.8
log writer process, 8.2.5, 9.3.2.2
multiplexed, definition, 1.1.3.3
overview, 1.1.3.3
rolling forward, 15.2.4.1, 15.2.4.1.1
rolling forward and, 15.2.4.1.1
size of buffers, 8.2.5
uncommitted data, 15.2.4.1.1
when temporary segments in, 2.4.3.3.1
writing buffers, 9.3.2.2
written before transaction commit, 9.3.2.2
redo records
how Oracle applies, 15.2
referenced
keys, 21.3.4
objects
dependencies, 6.1
referential integrity, 13.2.6.3, 21.3.4, 21.3.4
cascade rule, 21.1.1.4
examples of, 21.4
PRIMARY KEY constraints, 21.3.3
restrict rule, 21.1.1.4
self-referential constraints, 21.3.4.1, 21.4
set to default rule, 21.1.1.4
set to null rule, 21.1.1.4
refresh
incremental, 5.4.2
job queue processes, 9.3.2.7
materialized views, 5.4.2
REFs
dangling, 27.2.1.5.2, 27.2.1.5.3
dereferencing of, 27.2.1.5.3
implicit dereferencing of, 27.2.1.5.3
pinning, 27.6.2
scoped, 27.2.1.5.1
relational database management system (RDBMS)
SQL, 24.1
remote dependencies, 6.5.2
REMOTE_DEPENDENCIES_MODE parameter, 6.5.2.1
RENAME statement, 24.1.1.2
repeatable reads, 13.1.1
replication
materialized views (snapshots), 5.4
reserved words, 24.1.1
resource allocation, 1.2.2.6
methods, 14.10.1.1
resource consumer groups
definition, 14.10.1.1
resource limits
call level, 20.3.1.1.2
connect time for each session, 20.3.1.1.5
CPU time limit, 20.3.1.1.3
determining values for, 20.3.1.2.2
idle time in each session, 20.3.1.1.5
logical reads limit, 20.3.1.1.4
number of sessions for each user, 20.3.1.1.5
private SGA space for each session, 20.3.1.1.5
resource plan directives
definition, 14.10.1.1
resource plans
definition, 14.10.1.1
response queues, 9.4.1
restricted mode
starting instances in, 12.2.1.1
restricted rowid format, 26.7.2.2
resumable space allocation
overview, 4.1.3
REVERSE clause for indexes, 5.8.10
reverse key indexes, 5.8.10
REVOKE statement, 24.1.1.2
locks, 13.3.5.2
rewrite
predicates in security policies, 20.4.1.1
RMAN, 14.8.1
roles, 20.3.3
application, 20.3.3.1.1
application developers and, 20.5.3.4.1
definition, 20.1.3
enabled or disabled, 20.3.3.2
functionality, 20.3.2
in applications, 20.3.3
managing through operating system, 20.3.3.3
naming, 20.3.3
schemas do not contain, 20.3.3
security and, 20.5.3.2
use of passwords with, 20.3.3
user, 20.3.3.1.2
uses of, 20.3.3.1
rollback, 4.2.2
definition, 1.3.5
described, 4.2.2
ending a transaction, 4.1, 4.2.2
statement-level, 4.1.2
to a savepoint, 4.2.3
rollback segments
acquired during startup, 12.2.3.2
locks on, 13.3.6.2.3
parallel recovery, 15.2.4.1.2
read consistency and, 13.2.1
use of in recovery, 15.2.4.1.2
ROLLBACK statement, 24.1.1.3
rolling back, 4.1, 4.2.2, 15.2.4.1.2
rolling forward during recovery, 15.2.4.1.1, 15.2.4.1.1
row cache, 8.2.6.4
row data (section of data block), 2.2.1.5
row directories, 2.2.1.3
row locking, 13.2.6.2, 13.3.4.1
block-level recovery, 13.3.4.1
serializable transactions and, 13.2.5.3
row objects, 27.2.1.2.1
row pieces, 5.2.1.1
headers, 5.2.1.1
how identified, 5.2.1.2
row triggers, 22.3, 22.3.1.1
when fired, 22.4.1
ROWID datatype, 26.7, 26.7.2
extended rowid format, 26.7.2.1
restricted rowid format, 26.7.2.2
rowids, 5.2.1.2
accessing, 26.7.1
changes in, 26.7.2
in non-Oracle databases, 26.7.4
internal use of, 26.7.1, 26.7.2.4
logical, 26.7
logical rowids, 26.7.3
index on index-organized table, 5.9.3
physical guesses, 5.9.3, 26.7.3
staleness of guesses, 26.7.3.2
statistics for guesses, 26.7.3.2
of clustered rows, 5.2.1.2
physical, 26.7
row migration, 2.2.2.2
sorting indexes by, 5.8.6.2
universal, 26.7
row-level locking, 13.2.6.1, 13.3.4.1
rows, 5.2
addresses of, 5.2.1.2
chaining across blocks, 2.2.2.2, 5.2.1.1
clustered, 5.2.1.1
rowids of, 5.2.1.2
described, 5.2
fetched, 24.1.5.2.3
format of in data blocks, 2.2.1.3
headers, 5.2.1.1
locking, 13.2.6.2, 13.3.4.1
locks on, 13.3.4.1, 13.3.4.2.1
logical rowids, 26.7.3
index-organized tables, 5.9.3
migrating to new block, 2.2.2.2
pieces of, 5.2.1.1
row objects, 27.2.1.2.1
row-level security, 20.4.1
shown in rowids, 26.7.2.1, 26.7.2.2
size of, 5.2.1.1
storage format of, 5.2.1.1
triggers on, 22.3.1.1
when rowid changes, 26.7.2

S

same-row writers block writers, 13.2.6.1
SAVEPOINT statement, 24.1.1.3
savepoints, 4.2.3
described, 4.2.3
implicit, 4.1.2
rolling back to, 4.2.3
scalability
client/server architecture, 10.1
parallel SQL execution, 16.5
scans
full table
LRU algorithm, 8.2.4.2
table scan and CACHE clause, 8.2.4.2
Scheduler
overview, 14.12
schema object privileges, 20.3.2.2
schema objects, 5
definition, 1.1.5
dependencies of, 6.1
and distributed databases, 6.5.2.2
and views, 5.3.4
on non-existence of other objects, 6.3
triggers manage, 22.4
dependent on lost privileges, 6.2.1.5
dimensions, 5.5
information in data dictionary, 7.1
list of, 5.1
materialized views, 5.4
privileges on, 20.3.2.2
relationship to datafiles, 3.3.1, 5.1
trigger dependencies on, 22.4.5
user-defined types, 27.2
schemas
contents of, 5.1
contrasted with tablespaces, 5.1
definition of, 5.1
SCN. See system change numbers
scoped REFs, 27.2.1.5.1
Secure Sockets Layer, 20.5.1.2
security, 20.1
accessing a database, 20.5.1
administrator of, 20.5.1
administrator privileges, 12.1.1
application developers and, 20.5.3.4
application enforcement of, 20.3.3
auditing, 20.6, 20.6.1.1.3
auditing policies, 20.5.5
authentication of users, 20.5.1.2
data, 20.5.2, 20.5.2
data, definition, 1.2.7
database security, 20.5.1
database users and, 20.5.1.1
discretionary access control, 20.1
discretionary access control, definition, 1.2.7.1
domains, definition, 20.1.1.1
dynamic predicates, 20.4.1.1
enforcement mechanisms listed, 1.2.7.1
fine-grained access control, 20.4.1
general users, 20.5.3.1
level of, 20.5.2
operating-system security and the database, 20.5.1.3
passwords, 20.2.3
policies
implementing, 20.4.2
policies for database administrators, 20.5.3.3
privilege management policies, 20.5.3.1
privileges, 20.5.1
program interface enforcement of, 9.6
roles to force security, 20.5.3.2
security policies, 20.4.1
system, 7.1.2
system, definition, 1.2.7
test databases, 20.5.3.4.1
views and, 5.3.2
security domains
definition, 20.1.1.1
enabled roles and, 20.3.3.2
Segment Advisor, 14.2.4, 14.6.6
segment shrink, 14.6.6
segment space management, automatic, 2.2.2
segments, 2.4
data, 2.4.1
data, definition, 1.1.4.4
deallocating extents from, 2.3.4, 2.3.4
defined, 2.1
definition, 1.1.4.4
header block, 2.3.1
index, 2.4.2
overview of, 2.4
temporary, 2.4.3, 5.2.7.1
allocating, 2.4.3
cleaned up by SMON, 9.3.2.4
dropping, 2.3.4.5
operations that require, 2.4.3.1
tablespace containing, 2.4.3.3.1
SELECT statement
composite indexes, 5.8.2
SELECT statements, 24.1.1.1
subqueries, 24.1.5.2.3
sequences, 5.6
CHECK constraints prohibit, 21.3.5.1
independence from tables, 5.6
length of numbers, 5.6
number generation, 5.6
server parameter file, 12.1.3
startup, 1.1.8.2, 12.2.1
server processes, 9.3.1
listener process and, 10.3.2
server-generated alerts, 14.2.3
servers
client/server architecture, 10.1
dedicated, 9.5
shared servers contrasted with, 9.4
in client/server architecture, definition, 1.1.2.1.2
shared
architecture, 9.1.2, 9.4
dedicated servers contrasted with, 9.4
processes of, 9.4, 9.4.1.2
server-side scripts, 24.2.1.7
service names, 10.3.2
SERVICE_NAMES parameter, 10.3.2.1
session control statements, 24.1.1.4
sessions
connections contrasted with, 9.2.1
defined, 9.2.1
limits for each user, 20.3.1.1.5
memory allocation in the large pool, 8.2.7
package state and, 6.2.1.4
time limits on, 20.3.1.1.5
when auditing options take effect, 20.6.1.1.6
SET CONSTRAINTS statement
DEFERRABLE or IMMEDIATE, 21.5.2
SET ROLE statement, 24.1.1.4
SET TRANSACTION statement, 24.1.1.3
ISOLATION LEVEL, 13.2.5.1, 13.3.7
SGA. See system global area
SGA_MAX_SIZE initialization parameter, 8.2.10
shadow processes, 9.5
share locks
share table locks (S), 13.3.4.2.3
shared global area (SGA), 8.2
shared pool, 8.2.6
allocation of, 8.2.6.5
ANALYZE statement, 8.2.6.5
definition, 1.1.7.3.3
dependency management and, 8.2.6.5
described, 8.2.6
flushing, 8.2.6.5
object dependencies and, 6.4
row cache and, 8.2.6.4
size of, 8.2.6
Shared Pool Advisor, 14.5
shared server, 9.4
dedicated server contrasted with, 9.4
described, 9.1.2, 9.4
dispatcher processes, 9.4.1.1
limiting private SQL areas, 20.3.1.1.5
Oracle Net Services or SQL*Net V2 requirement, 9.4, 9.4.1.1
private SQL areas, 8.3.1.1
processes, 9.4.1.2, 9.4.1.2
processes needed for, 9.4
restricted operations in, 9.4.2
session memory in the large pool, 8.2.7
shared server processes (Snnn), 9.4.1.2
described, 9.4.1.2
shared SQL areas, 8.2.6.2, 24.1.3
ANALYZE statement, 8.2.6.5
definition, 1.1.7.3.3
dependency management and, 8.2.6.5
described, 8.2.6.2
loading SQL into, 24.1.5.2.2
overview of, 24.1.3
parse locks and, 13.3.5.3
procedures, packages, triggers and, 8.2.6.3
size of, 8.2.6.2.1
SHARED_MEMORY_ADDRESS parameter, 8.2.11.2
SHARED_POOL_SIZE initialization parameter, 8.2.1
SHARED_POOL_SIZE parameter, 8.2.6
system global area size and, 8.2.1
SHARED_SERVERS parameter, 9.4.1.2
shutdown, 12.3, 12.3.3
abnormal, 12.2.1.2, 12.3.3.1
deallocation of the SGA, 8.2
prohibited by dispatcher processes, 9.4.2
steps, 12.3
SHUTDOWN ABORT statement, 12.3.3.1
consistent whole database backups, 15.1.1.1
signature checking, 6.5.2.1
SKIP_UNUSABLE_INDEXES parameter, 5.8.5.3.3
SMON background process, 9.3.2.4
SMON process, 9.3.2.4
software code areas, 8.5
shared by programs and utilities, 8.5
sort operations, 3.2.11
sort segments, 3.2.11.1
SORT_AREA_SIZE parameter, 2.4.3.1
space management
extents, 2.3
optimization of free space in blocks, 2.2.2.1
PCTFREE, 2.2.3.1
PCTUSED, 2.2.3.2
row chaining, 2.2.2.2
segments, 2.4
SQL, 24.1
cursors used in, 24.1.2
data definition language (DDL), 24.1.1.2
data manipulation language (DML), 24.1.1.1
dynamic SQL, 24.2.1.2.4
embedded, 24.1.1.6
user-defined datatypes, 25.2.4
functions, 24.1
COUNT, 5.8.11.4
in CHECK constraints, 21.3.5.1
NVL, 5.2.3
memory allocation for, 8.2.6.5
overview of, 24.1
parallel execution, 1.2.5.6, 16.5
parsing of, 24.1.4
PL/SQL and, 24.2.1
recursive
cursors and, 24.1.2
reserved words, 24.1.1
session control statements, 24.1.1.4
shared SQL, 24.1.3
statement-level rollback, 4.1.2
system control statements, 24.1.1.5
transaction control statements, 24.1.1.3
transactions and, 4.1, 4.2.1
types of statements in, 24.1.1
user-defined datatypes
embedded SQL, 25.2.4
OCI, 25.2.1
SQL areas
private, 8.2.6.2
shared, 8.2.6.2, 24.1.3
shared, definition, 1.1.7.3.3
SQL statements, 24.1.1, 24.1.5.1
array processing, 24.1.5.2.8
auditing
when records generated, 20.6.1.1.6
creating cursors, 24.1.5.2.1
dictionary cache locks and, 13.3.6.2.1
distributed
routing to nodes, 24.1.5.2.2
embedded, 24.1.1.6
execution, 24.1.5.1, 24.1.5.2.8
handles, definition, 1.1.7.3.4
number of triggers fired by single, 22.4.1
parallel execution, 1.2.5.6, 16.5
parse locks, 13.3.5.3
parsing, 24.1.5.2.2
privileges required for, 20.3.2.2
referencing dependent objects, 6.2
resource limits and, 20.3.1.1.2
successful execution, 4.1.1
transactions, 24.1.5.4
triggers on, 22.3.1.2
triggering events, 22.2.1
types of, 24.1.1
SQL Tuning Advisor, 14.2.4, 14.4
SQL*Menu
PL/SQL, 24.2.1.1.2
SQL*Plus, 1.2.2.3
ALERT file, 9.3.3
anonymous blocks, 24.2.1.1.2
connecting with, 20.2.1
executing a package, 24.2.1.5
executing a procedure, 24.2.1.4
lock and latch monitors, 13.3.6
session variables, 24.2.1.2.1
SQL statements, 24.1
statistics monitor, 20.3.1.2.2
SQL_TRACE parameter, 9.3.3
SQL92, 13.1.1
SQL-99 extensions, 1.2.5.8
SQLAccess Advisor, 14.2.4, 14.4
SQLJ, 24.2.2.7.4
object types, 24.2.2.7.4
SQLLIB, 25.2.4
SSL. See Secure Sockets Layer.
staging
databases, 16.1.1.4
files, 16.1.1.4
standards
ANSI/ISO, 21.2
isolation levels, 13.1.1, 13.2.6.1
integrity constraints, 21.2
standby database
mounting, 12.2.2.2
startup, 1.1.8.2, 12.1, 12.2
allocation of the SGA, 8.2
starting a, 8.2.11.2
forcing, 12.2.1.2
prohibited by dispatcher processes, 9.4.2
restricted mode, 12.2.1.1
steps, 1.1.8.2, 12.2
statement failure
definition, 1.2.3.1
statement triggers, 22.3
described, 22.3.1.2
when fired, 22.4.1
statement-level read consistency, 13.2.2
statistics
checkpoint, 9.3.2.3
storage
datafiles, 3.3
indexes, 5.8.6
logical structures, 3.2, 5.1
nulls, 5.2.3
triggers, 22.1, 22.4.3
view definitions, 5.3.3
STORAGE clause
using, 2.3.2
storage parameters
setting, 2.3.2
stored functions, 24.2.1.3, 24.2.1.4
stored outlines, 24.1.6.1.1
editing, 24.1.6.1.2
stored procedures, 24.2.1, 24.2.1.3, 24.2.1.4
calling, 24.2.1.4
contrasted with anonymous blocks, 24.2.1.4.3
triggers contrasted with, 22.1
variables and constants, 24.2.1.2.1
streams pool, 8.2.9
Structured Query Language (SQL), 24.1
structures
data blocks
shown in rowids, 26.7.2.2
data dictionary, 7
datafiles
shown in rowids, 26.7.2.2
locking, 13.3.5
logical, 2
data blocks, 2, 2.2
extents, 2.1, 2.3
schema objects, 5.1
segments, 2.1, 2.4
tablespaces, 3, 3.2
memory, 8
physical
control files, 3.4
datafiles, 3, 3.3
processes, 9
subqueries, 24.1.5.2.3
CHECK constraints prohibit, 21.3.5.1
in DML statements
serializable isolation, 13.2.7.2
inline views, 5.3.7
query processing, 24.1.5.2.3
summaries, 5.4
synonyms
constraints indirectly affect, 21.2
described, 1.1.5.5, 5.7
for data dictionary views, 7.2.1.1
inherit privileges from object, 20.3.2.2
private, 5.7
public, 5.7
uses of, 5.7
SYS account
policies for protecting, 20.5.3.3.1
SYS user name
data dictionary tables owned by, 7.1.2
SYS username
V$ views, 7.3
SYSDBA privilege, 12.1.2
SYSOPER privilege, 12.1.2
SYSTEM account
policies for protecting, 20.5.3.3.1
system change numbers (SCN)
committed transactions, 4.2.1
defined, 4.2.1
read consistency and, 13.2.1, 13.2.2
redo logs, 9.3.2.2
when determined, 13.2.1
system control statements, 24.1.1.5
system global area (SGA), 8.2
allocating, 1.1.8.2, 12.2.1
contents of, 8.2
data dictionary cache, 7.2.1.2, 8.2.6.4
database buffer cache, 8.2.4
definition, 1.1.7.3
diagram, 12.1
fixed, 8.2
large pool, 8.2.7
limiting private SQL areas, 20.3.1.1.5
overview of, 8.2
redo log buffer, 4.2.1, 8.2.5
rollback segments and, 4.2.1
shared and writable, 8.2
shared pool, 8.2.6
size of
variable parameters, 12.1.3
when allocated, 8.2
system monitor process (SMON), 9.3.2.4
defined, 9.3.2.4
Real Application Clusters and, 9.3.2.4
rolling back transactions, 15.2.4.1.2
temporary segment cleanup, 9.3.2.4
system privileges, 20.3.2.1
described, 20.3.2.1
system security
definition, 1.2.7
SYSTEM tablespace, 3.2.2
data dictionary stored in, 3.2.2.1, 7.1, 7.2.2
locally managed, 1.1.4.1, 3.2.2
online requirement of, 3.2.9
procedures stored in, 3.2.2.2

T

table compression, 16.2.4
partitioning, 16.2.4
table functions, 24.2.1.4.7
parallel execution, 24.2.1.4.7
pipelined, 24.2.1.4.7
tables
affect dependent views, 6.2.1.1
base
relationship to views, 5.3.1
clustered, 5.11
clustered, definition, 1.1.5.4
controlling space allocation for, 5.2.1
directories, 2.2.1.2
DUAL, 7.2.2.4
dynamic partitioning, 16.5.1
enable or disable constraints, 21.6
external, 5.2.8, 11.6
full table scan and buffer cache, 8.2.4.2
how data is stored in, 5.2.1
indexes and, 5.8
index-organized
key compression in, 5.8.9.3, 5.9.1
index-organized tables, 5.9
logical rowi, 5.9.3
logical rowids, 26.7.3
integrity constraints, 21.1, 21.2
locks on, 13.3.4.1, 13.3.4.2.1, 13.3.4.2.4
maximum number of columns in, 5.3
nested tables, 5.2.6, 27.2.2.2
normalized or denormalized, 5.5
object tables, 27.1.1, 27.2.1.2
virtual, 27.6
overview of, 5.2
partitions, 1.2.5.10, 17.2.2.2, 18.1
presented in views, 5.3
temporary, 5.2.7
segments in, 2.4.3.2
validate or novalidate constraints, 21.6
virtual or viewed, 1.1.5.3
See also external tables
tablespace point-in-time recovery, 15.2.1.2.1
clone database, 12.2.2.3
tablespaces, 3.2
contrasted with schemas, 5.1
default for object creation, definition, 20.1.4.1
definition, 1.1.4.1
described, 3.2
dictionary managed, 3.2.7.3
locally managed, 3.2.7.1
locks on, 13.3.6.2.3
moving or copying to another database, 3.2.12.1
offline, 3.2.9, 3.3.3
and index data, 3.2.9.2
remain offline on remount, 3.2.9.1
online, 3.2.9, 3.3.3
online and offline distinguished, 1.1.4.1.1
online backups, 15.1.3.1
overview of, 3.2
quotas, definition, 20.1.4.3
read-only, 3.2.10
recovery, 15.2.1.2.1
relationship to datafiles, 3.1
size of, 3.1.2
space allocation, 3.2.7
temporary, 3.2.11
temporary, definition, 20.1.4.2
used for temporary segments, 2.4.3.3.1
tasks, 9.1
tempfiles, 3.3.4
temporary segments, 2.4.3.2, 2.4.3.3.1, 5.2.7.1
allocating, 2.4.3.3.1
allocation for queries, 2.4.3.3.1
deallocating extents from, 2.3.4.5
dropping, 2.3.4.5
operations that require, 2.4.3.1
tablespace containing, 2.4.3.3.1
when not in redo log, 2.4.3.3.1
temporary tables, 5.2.7
temporary tablespaces, 3.2.11
default, 3.2.5
definition, 20.1.4.2
threads
shared server, 9.4
three-valued logic (true, false, unknown)
produced by nulls, 5.2.3
time stamp checking, 6.5.2.1
time zones
in date/time columns, 26.4.5
TIMESTAMP datatype, 26.4.5
TIMESTAMP WITH LOCAL TIME ZONE datatype, 26.4.5
TIMESTAMP WITH TIME ZONE datatype, 26.4.5
TO_CHAR function
globalization support default in CHECK constraints, 21.3.5.1
globalization support default in views, 5.3.3.1
Julian dates, 26.4.1
TO_DATE function, 26.4, 26.4
globalization support default in CHECK constraints, 21.3.5.1
globalization support default in views, 5.3.3.1
Julian dates, 26.4.1
TO_NUMBER function, 26.3.1
glob, 5.3.3.1
globalization support default in CHECK constraints, 21.3.5.1
Julian dates, 26.4.1
trace files, 9.3.3
definition, 1.1.3.6
LGWR trace file, 9.3.2.2
transaction control statements, 24.1.1.3
in autonomous PL/SQL blocks, 4.3.1.1
transaction recovery, 15.2.4.1.2
transaction set consistency, 13.2.6.1, 13.2.6.1
transaction tables
reset at recovery, 9.3.2.5
transactions, 4
assigning system change numbers, 4.2.1
autonomous, 4.3
within a PL/SQL block, 4.3.1
block-level recovery, 13.3.4.1
committing, 4.1.1, 4.2.1, 9.3.2.2
group commits, 9.3.2.2
committing, definition, 1.3.5.1
concurrency and, 13.3.1
controlling transactions, 24.1.5.4
deadlocks and, 4.1.2, 13.3.2
defining and controlling, 24.1.5.4
definition, 1.3.3
described, 4.1
distributed
deadlocks and, 13.3.2.1
resolving automatically, 9.3.2.6
two-phase commit, 4.2.5
end of, 4.2
consistent data, 24.1.5.4
in-doubt
resolving automatically, 4.2.5, 12.2.3.3
naming, 4.2.4
read consistency of, 13.2.3
read consistency, definition, 1.2.1.2.1
read-only, definition, 1.2.1.2.2
redo log files written before commit, 9.3.2.2
rolling back, 4.2.2
partially, 4.2.3
rolling back, definition, 1.3.5.1
savepoints in, 4.2.3
serializable, 13.2.5
space used in data blocks for, 2.2.1.6
start of, 4.2
statement level rollback and, 4.1.2
system change numbers, 9.3.2.2
terminating the application and, 4.2
transaction control statements, 24.1.1.3
triggers and, 22.4.2
transient type descriptions, 25.2.4.1
triggers, 1.2.8.3, 22
action, 22.2.3
timing of, 22.3.2
AFTER triggers, 22.3.2.2
BEFORE triggers, 22.3.2.1
cascading, 22.1.1.1
compared with Oracle Forms triggers, 22.1
constraints apply to, 22.4
constraints contrasted with, 22.1.1.2
data access and, 22.4.2
dependency management of, 6.2.1.2, 22.4.5
enabled triggers, 22.4
enabled or disabled, 22.4
enforcing data integrity with, 21.1.2.2
events, 22.2.1
firing (executing), 22.1, 22.4.4
privileges required, 22.4.4
steps involved, 22.4
timing of, 22.4.1
INSTEAD OF triggers, 22.3.3
object views and, 27.6.3
INVALID status, 6.2.1.2
Java, 22.2.3
parts of, 22.2
procedures contrasted with, 22.1
publish-subscribe support, 22.3.4
restrictions, 22.2.2
row, 22.3.1.1
schema object dependencies, 22.4, 22.4.5
sequence for firing multiple, 22.4.1
shared SQL areas and, 8.2.6.3
statement, 22.3.1.2
storage of, 22.4.3
types of, 22.3.1
UNKNOWN does not fire, 22.2.2
uses of, 22.1.1
TRUNCATE statement, 24.1.1.2
two-phase commit
transaction management, 4.2.5
triggers, 22.4
two-task mode
listener process and, 9.4.1.1
type descriptions
dynamic creation and access, 25.2.4.1
transient, 25.2.4.1
type inheritance, 27.3

U

UDAG (User-Defined Aggregate Functions), 27.4
UDAGs (User-Defined Aggregate Functions)
creation and use of, 27.5
Undo Advisor, 14.2.4, 14.6.1
undo management, automatic, 2.4.4
undo tablespaces, 3.2.4
Unicode, 26.2, 26.2.3, 26.2.4, 26.2.5, 26.5.2
unique indexes, 5.8.1
UNIQUE key constraints, 21.3.2
composite keys, 21.3.2.1, 21.3.2.3
constraint checking, 21.4
indexes used to enforce, 21.3.2.2
maximum number of columns, 21.3.2.2
NOT NULL constraints and, 21.3.2.3
nulls and, 21.3.2.3
size limit of, 21.3.2.2
unique keys, 21.3.2.1
composite, 21.3.2.1, 21.3.2.3
UNUSABLE indexes
function-based, 5.8.5.3.3
update no action constraint, 21.3.4.3
UPDATE statement, 24.1.1.1
foreign key references, 21.3.4.3.1
freeing space in data blocks, 2.2.2.1
triggers, 22.2.1
BEFORE triggers, 22.3.2.1
updates
object views, 27.6.3
updatability of object views, 27.6.3
updatability of views, 5.3.5, 22.3.3, 22.3.3.1
updatable join views, 5.3.5
update intensive environments, 13.2.5.3
updating tables
with parent keys, 21.3.4.4.1, 21.3.4.4.2
UROWID datatype, 26.7
USE_INDIRECT_DATA_BUFFERS parameter, 8.2.11.3
user processes
connections and, 9.2.1
dedicated server processes and, 9.5
definition, 1.1.7.6.1
sessions and, 9.2.1
shared server processes and, 9.4.1.2
user profiles
definition, 20.1.4.4
user program interface (UPI), 9.6.1
USER_ views, 7.2.2.1
USER_UPDATABLE_COLUMNS view, 5.3.5
User-Defined Aggregate Functions (UDAGs)
creation and use of, 27.5
user-defined aggregate functions (UDAGs), 27.4
user-defined datatypes, 27, 27.2
collections, 27.2.2
nested tables, 27.2.2.2
variable arrays (VARRAYs), 27.2.2.1
object types, 27.1.1, 27.2.1
users
authentication
about, 20.5.1.2
authentication of, 20.2
dedicated servers and, 9.5
end-user security policies, 20.5.3.2
listed in data dictionary, 7.1
locks, 13.3.8
multiuser environments, 9.1.1
password encryption, 20.2.3.1
password security, 20.5.3.1
policies for managing privileges, 20.5.3.1
processes of, 9.2
profiles of, 20.3.1.2
roles and, 20.3.3
for types of users, 20.3.3.1.2
security and, 20.5.1.1
security for general users, 20.5.3.1
temporary tablespaces of, 2.4.3.3.1
user names
sessions and connections, 9.2.1

V

V$BUFFER_POOL view, 8.2.4.3.1
V$RECOVER_FILE view, 15.2.2
V_$ and V$ views, 7.3
VARCHAR datatype, 26.2.2.1
VARCHAR2 datatype, 26.2.2
non-padded comparison semantics, 26.2.2
similarity to RAW datatype, 26.6
variables
embedded SQL, 24.1.1.6
in stored procedures, 24.2.1.2.1
object variables, 27.6.2
varrays, 27.2.2.1
index-organized tables, 5.9.1
key compression, 5.8.9.3
view hierarchies, 27.6.5
views, 5.3
altering base tables and, 6.2.1.1
constraints indirectly affect, 21.2
containing expressions, 22.3.3.2
data dictionary
updatable columns, 5.3.5
definition expanded, 6.2.1.1
dependency status of, 6.2.1.1
fixed views, 7.3
globalization support parameters in, 5.3.3.1
how stored, 5.3.1
indexes and, 5.3.3.2
inherently modifiable, 22.3.3.1
inline views, 5.3.7
INSTEAD OF triggers, 22.3.3
materialized views, 5.4
maximum number of columns in, 5.3
modifiable, 22.3.3.1
modifying, 22.3.3.1
object views, 5.3.6
updatability, 27.6.3
overview of, 5.3
prerequisites for compilation of, 6.2.1
pseudocolumns, 22.3.3.2
schema object dependencies, 5.3.4, 6.2
SQL functions in, 5.3.3.1
updatability, 5.3.5, 22.3.3.1, 27.6.3
uses of, 5.3.2

W

waits for blocking transaction, 13.2.6.1
Wallet Manager, 20.2.2.2
wallets, 20.2.2.2
warehouse
materialized views, 5.4
Web page scripting, 24.2.1.7
whole database backups
consistent, 15.1.1.1
using SHUTDOWN ABORT statement, 15.1.1.1
definition, 15.1.2.1
inconsistent, 15.1.1.2
write-ahead, 9.3.2.2
writers block readers, 13.2.6.1

X

X.509 certificates, 20.2.2.2
XA
session memory in the large pool, 8.2.7
XDK, 1.2.6.1
XML datatypes, 26.9
XML DB, 1.2.6.1, 19.2
XMLType datatype, 19.2, 26.9.1

Y

year 2000, 26.4.3