The Apex Guide Oracle Apex Guide RSS Feed


Oracle Application Express

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 


VPD A Virtual Private Database (VPD) provides an application programming interface (API) that enables developers to assign security policies to database tables and views.
Using PL/SQL, developers can create security policies with stored procedures, and bind the procedures to a table or view by means of a call to an RDBMS package.
Such policies are based on the content of application data stored within the database, or are based on context variables provided by the Oracle database.
VPN A Virtual Private Network is configured within a public network in order to take advantage of the economies of scale and management facilities of large networks.
VPNs are widely used by enterprises to create Wide Area Networks that span large geographic areas, to provide site-to-site connections to branch offices and to allow mobile users to dial up their company LANs.
Validations The process of checking if something satisfies a certain criterion.
Validations enable you to create logic controls to verify whether user input is valid. For example, a validation can check whether or not a value has been entered into a mandatory field.
You can define a validation declaratively by selecting a validation method. You enter the actual validation edit check in the Validation Messages field.
Be aware that if a validation fails, subsequent page processes or computations will not occur. Also remember that the validation you enter must be consistent with the validation type you selected.
Vertical Partitioning Vertical partitioning divides a single logical table into multiple physical tables based on the columns.
All rows may appear in the new tables, but each new table contains a subset of the original table's columns.
The set of columns may be redundant across tables, and will necessarily be so for the columns that implement keys and indexes. Columns for row-level metadata are also implemented in all resultant tables.
Vertical partitioning is employed when there is a regular need to access or to isolate a readily identifiable subset of the "parent" table's columns.
This technique may be effective to meet security, distribution, and usability requirements.
View Data structure that results from an SQL query and that is built from data in one or more tables.

© RuleWorks - All Rights Reserved - Policy - - Sitemap