answersLogoWhite

0

First, a database needs an Operating System. Unix, usually for Oracle database. Once the OS is in place, you can create your database. A database has a system catalog, which keep track of your table structures, data, updates. There are objects in a database. Tables (contain data), views (virtual tables), triggers (rules on how to insert into tables), programs, etc. The data is contained in the tables. Tables have columns. The data is stored in these columns. Here's what a table's structure looks like: -- Definition of table \.$D013.VSS.STYLE
-- Definition current at 19:30:43 - 06/01/07

(
PARTITION_NBR SMALLINT NO DEFAULT NOT NULL
, STYLE_NBR INT NO DEFAULT NOT NULL
, CLASS_NBR SMALLINT NO DEFAULT NOT NULL
, DEPT_NBR SMALLINT NO DEFAULT NOT NULL
, DIVISION_NBR SMALLINT NO DEFAULT NOT NULL
, DISPLAY_STYLE INT NO DEFAULT NOT NULL
, STYLE_DESC CHAR(28) NO DEFAULT NOT NULL
)
>> You can find out how many rows are in this table: (56,523) >>select count(*) from $d013.vss.style;

(EXPR)
--------------------

56523

--- 1 row(s) selected.
>> Here's what one row in the table looks like: >>select * from $d013.vss.style
+>where style_desc like "%LACE CAMI%";

PARTITION_NBR STYLE_NBR CLASS_NBR DEPT_NBR DIVISION_NBR DISPLAY_STYLE
------------- ----------- --------- -------- ------------ -------------
STYLE_DESC
----------------------------

1 632010 63 2 20 632010
75.BEADED LACE CAMI/TAP

User Avatar

Wiki User

18y ago

What else can I help you with?

Related Questions

What countries and companies want to exploit Antarctica's resources?

oil companys and gas comapnys


How to use exploit in a sentence?

The US Banking System has exploited taxpayers by making their retirement fundsdrop in the Stock Market. It would be a good idea to exploit (take advantage of) this situation.


What kind of software is an exploit?

Exploit is a computer security software. Exploit helps protect a site from being attacked by bugs and glitches. An exploit can take over a computer system, and the software "Exploit" helps protect against that.


Why has globalization result in increasing environmental damage around the world?

The profit motive drives companies that are competing in the global marketplace to exploit natural resources.


Are there companies that wish to exploit Antarctica?

Antarctica Do.


What is a computer exploit How do software manufacturers address exploits when they are found?

A computer exploit is something that exploits defective codes. Software manufacturers address exploits when they are found by releasing a patch.


How can companies exploit the potential of public relation?

'pkrorogjweked.ae'e


What is a sentence for exploit?

The black mail was used as a way to exploit her


An announcement of a software exploit or port scan are examples of?

A precursor


An announcement of a software exploit or detection of a port scan are examples of?

A precursor


What has allowed developing nations today exploit their resources faster than the US did?

The country’s shared their resources


How do you get the bloodhound Exploit 20 Virus off your computer?

To remove the Bloodhound Exploit 20 Virus from your computer, you can use reputable antivirus software to scan and remove the virus. Ensure your antivirus database is up to date before running a full system scan. Additionally, you can try booting your computer in Safe Mode and running a scan for more effective virus removal.