What are the (VARIANT OPAQUE) opaque types?

A number of types of oracle as XMLType, Anydata and lcr$ _row_record are defined in SYS 'AS OPAQUE VARYING (*).
USING THE LIBRARY.

I wonder what is it? The only thing in the documentation I've found is "Oracle OPAQUE Types" of the SQLJ Developer's Guide. (http://docs.oracle.com/cd/E11882_01/java.112/e10590/objcoll.htm#i1008113)

But I could not understand how it relates to PL/SQL. How can I make my own opaque type?

What are the benefits of the opaque types compared to the normal PL/SQL object types?

>
In "The PL/SQL language Reference" book it nothing on this "AS OPAQUE VARIABLE", so how do I use just TYPE CREATE or REPLACE to make an opaque type?
>
There is no syntax like "AS VARIANT OPAQUE."

When I said
>
You can also create your own types 'opaque' using TYPE CREATE or REPLACE
>
what I mean is that the types of Oracle you create is "opaque", in the sense that at the level of the instance object is just a series of bytes. You can access different components by using the dot notation.
>
He won't in details how to create PL/SQL
>
The data cartridge doc I cited goes into detail of how to create them; It is not just call them OPAQUE types. But functionally, they are since the internal components are concealed to Oracle. You must implement the cartridge interface functions that manipulate objects of your cartridge and Oracle Oracle does not or record what the internal structure is.

The doc you city also explains how to create in Java that implements the appropriate interface.

As a user, you need to focus on how to implement the functionality, you need and do not worry about the question of whether a class or an object, you create gets listed as OPAQUE in the dictionary.

Tags: Database

Similar Questions

  • Windows 7: what are the individual "file system type" files in the system volume information folder?

    Original title: Windows 7: what are the individual "file system type" files in the folder system volume information accumulating [not the files system restore I already know and don't use yet]

    Hi-

    I stopped using the system restore, I found a better solution, for me, that's what I have to do.
    Then I noticed that several 'file system' 'type' was being created, 12 times yesterday, 3 up to today in the early hours of the morning and stored in they System Volume Information folder, anywhere from 30 MB to 2 GB.
    three of these file names 'file system' 'type' are:
    {debb21da-eafc-11e2-ba92-00241dc5d84e} {3808876b-c176-4e48-b7ae-04046e6cc752}
    {3debe675-eaa7-11e2-a462-00241dc5d84e} {3808876b-c176-4e48-b7ae-04046e6cc752}
    {3debe5e8-eaa7-11e2-a462-00241dc5d84e} {3808876b-c176-4e48-b7ae-04046e6cc752}
    Anyone know what it could be?
    Can I follow up to what program/process they are related?
    Are they safe to delete?
    Ideas?  Suggestions?
    Thank you.
    John

    Hi John,.

    Yes, you can delete the system volume information data if not to use the system restore.

    You will need to give permission to the folder until you delete it.

    How to open a file if I get an access denied message?

    Please post with the State of the question.

  • What are the different types of tools available for the siebel file cleaning

    Hi all

    Please let me know what are the different types of tools available for siebel file system cleaning.

    Thanks in advance
    Remy

    assuming that you have installed the Siebel server under d:\D:\dba81

    CD D:\sba81\siebsrvr\bin

    (1) mode considered
    sfscleanup.exe/u SIEBEL-USER /p /C SIEBEL-word of PAST SIEBEL-DATA-SOURCE /d SIEBEL-OWNER of the TABLE/f SIEBEL-LEADER-SYSTEM/m SIEBEL-FILE-SYSTEM-FOR-INCORRECT_FILES/r Y/x 'D:\sba81\siebsrvr\log\sfscleanup_report.log '.

    (2) actual performance
    Replace/r Y, N/r

    Best regards
    EvtLogLvl

  • What are the best practices for creating only time data types, and not the Date

    Hi gurus,

    We use 12 c DB and we have a requirement to create the column with datatype of time only, if someone please describe what are the best practices for the creation of this.

    I would strongly appreciate ideas and suggestions.

    Kind regards
    Ranjan

    Hello

    How do you intend to use the time?

    If you are going to combine with DATEs or timestamps from a other source, then an INTERVAL DAY TO SECOND or NUMBER may be better.

    Will you need to perform arithmetic operations on time, for example, increase the time to 20%, or take an average?   If so, the NUMBER would be preferable.

    You are just going to display it?  In this case, DAY INTERVAL in SECONDS, DATE or VARCHAR2 would work.

    As Blushadow said, it depends.

  • What are the details of the 3-year warranty on Tecra?

    What are the details of the 3-year warranty for computer Tecra laptop w/r bad pixels? Toshiba gives no kind of guarantee of "zero pixel wrong" even for a limited period?

    Hello

    As in the previous mentioned announcement, there must be a certain number of dead pixels on the display in place of the screen.
    It s no matter if it s a s one or three years warranty.

    As far as I know during the guarantee period Toshiba will replace your screen if the number of defective pixels is greater at:
    -10 bad pixels to screen VGA (640 x 480)
    -15 bad pixels to screen SVGA (800 x 600)
    -20 defective pixels for screen XGA (1024 x 768)

    I found some useful documents FAQ on the Toshiba site.
    Please read these documents for yourself:

    I have one or more bad pixels on my screen, I can fix it?
    http://support.toshiba-tro.de/KB0/FAQ350079001NR01.htm

    What is the maximum number allowed and the type of fault of pixel your monitor LCD Toshiba can expose by 1 million pixels?
    http://support.toshiba-tro.de/KB0/TSB5400ZD0002R01.htm

  • What are the best deals for an iPad?

    What are the best deals for an iPad?

    That best meets your needs. We do not know what those needs are, it is really not possible to say which cases would be best for you.  I would recommend that search you Amazon for the type of case (business keyboard, leather case, etc.) in which your interests and then read the comments for those who is very much appreciated.

  • What are the startup keys for installation on flag 505 b MT

    What are the startup keys for installation on flag 505 b MT

    Randy Rich

    Randy, welcome to the forum.

    If you are wanting to get into the BIOS, you can type the F10 key during startup.  You can find this information in the section of the manual under the illustrated parts and Service card.

    Please, click on "Thumbs Up +" if I helped you and click "Accept as Solution" If your problem is resolved.

  • What are the causes of the log of user account on missing cursor in Windows XP? I have two trays of office that they have this same problem. If you restart them the cursor returns?

    What are the causes of the log of user account on missing cursor in Windows XP? I have two trays of office that they have this same problem. If you restart them the cursor returns?

    Hi DaddyJeff,

    1. don't you make changes before the show?
    2. are you referring to the cursor in the area of user password on the login screen of Windows?
    3. when the cursor goes missing, the mouse pointer works on screen?

    It is difficult to say what is causing this problem. If the mouse pointer freezes or stops working, then we recommend you to reinstall the mouse. To do this, try the following steps:
    a. sign in to Windows.
    b. Click Start, click Run, type devmgmt.msc, and then click ok.
    c. in the list of objects, expand mice and other pointing devices.
    d. right click on the sub element and click on uninstall.
    e. unplug the mouse and plug it back.
    f. the Device Manager, select an item in the list, click the Action menu, click scan for hardware changes.
    g. check if the mouse is detected, if so, then install it.

    See mouse USB which is connected to a USB 2.0 hub is not detected by Windows XP


    Note:
    if the problem persists, restore the computer to an earlier time. See How to restore Windows XP to a previous state

    Visit our Microsoft answers feedback Forum and let us know what you think.

  • I want to download all versions are necessary, but I can not understand what are the dated versions are currently installed in my PC?

    Re: "drivers and downloads" my computer dell laptop inspiron I6400 / E 1505; Windows vista Home premium, 32 bit OS: I want to download all versions are necessary, but I can not understand what are the dated versions are currently installed in my PC?

    Hello

    I suggest you try the given below steps that would help you to view the details of the driver.

    (a) type devmgmt.msc into the search box start and press enter.

    (b) in the Device Manager, right click on the device you need to display the version.

    (c) select Properties.

    (d) click the driver tab and display the version of the driver in the Driver Details.

    Hope this information is useful.

  • look up NS - what are the domain servers?

    What are the domain servers, host? What does 'mark' when I try to copy and paste? and finally that authority no answer means in the ns-look-up?  Do two addresses expected to match then presented the homepage and answer non, what does everything mean? David StClair

    Hello
    A Windows Server domain is a logical group of computers running versions of Microsoft Windows operating system that share a central directory database. This central database (called Active Directory from Windows 2000 [1], Domain Services Active Directory in Windows Server 2008 and Server 2008 R2, also referred to as NT Directory Services on operating systems Windows NT, or NTDS) contains the user accounts and the security information for resources in this area. Each person who uses computers in a domain receives its own unique account or user name. This account can then be assigned access to resources within the domain.

    In a domain, the directory resides on computers that are configured as "domain controllers." A domain controller is a server that manages all aspects related to security between the user and domain interactions, centralizing administration and security. A Windows Server domain is usually adapted to the companies and/or organizations when more than 10 PCs are in use.

    Working groups Windows, on the other hand, is the other model to group windows computers in a network environment that comes with Windows. Workgroup computers are considered to be 'standalone' - i.e. There is no formal affiliation or the authentication process formed by the working group. A working group has no servers and clients, and as such, it represents the paradigm of Peer-to-Peer network (or from Client to Client), rather than to centralised architecture constituted by Client-Server. Working groups are considered difficult to manage beyond a dozen clients and lack of unique signature, scalability, resilience disaster recovery and many features of security functionality. Working groups of Windows are more suitable for small or office networks home.

    A domain does not refer to a single location or a specific type of network configuration. Computers in a domain can share a physical proximity on a small LAN, or they may be located in different parts of the world. As long as they can communicate, their physical position is irrelevant.

    Active Directory computers within a domain can be assigned in OUs based on location, organizational structure, or other factors. In the area of the original Windows Server machines system (shipped with Windows NT 3.x/4) could only be seen in two States of administrative tools, 1) computers detected (on the network) and 2) computers which were actually in the domain. Active Directory makes it easier for administrators to manage and deploy changes to the network and political (see Group Policy) to all connected machines to the domain.

    Computers can connect to a domain easily via LAN or WAN using a VPN connection. The users in a domain are able to use enhanced security for the VPN connection with the support of a certification authority that is granted when a field is added to a network, and thus the smart cards and digital certificates can be used to confirm the identities and protect the stored information.

  • Hardware change - inform them where and what are the details to be informed

    Hello!

    I want to use my hard drive, change the map motherboard and CPU only. Who should I email and what are the details I need to provide to get my two windows xp and vista activated and validated after having reformatted and re-installed?

    If I happen to call by phone I phone number of the customer care person knowing Tamil language?

    Kind regards

    Components

    You must notify anyone.  If you have problems activating automatically after the changes, do it manually.

    To activate manually, go to start, search, and type in slui 4 enter.  Enter your country and press Next.  You will be on a screen with a phone number and a bunch of codes below.  Dial the number and browse automatic guests until you get to a human being.  Have your handy product code because it will be asked.  Explain the situation, but it's the same PC and only installed on this PC.  They should give you a code to enter on this screen to activate Vista.

    Good luck!

    Lorien - MCSA/MCSE/network + / has + - if this post solves your problem, please click the 'Mark as answer' or 'Useful' button at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly.

  • What are the signatures of security? How do they contribute to ward off the threat?

    What are the signatures of security? How do they contribute to ward off the threat?

    Hello

    Cisco devices use technology based on signatures to detect network intrusions (attacks).
    These signatures detects the type of network intrusion using its sensors as they scan the network packets when parsing packets that they used their signatures to detect the type of intrusion as: attack denail of service (DoS).

    The sensor works like virus checking programs. The IPS has a set of different signatures, this sensor uses to with the activity of the network. When a match is found, the sensor will take the measures needed, such as the notation or such as defined in policies.

    We can also modify signatures according to our need.
    For a sensor to control traffic for a particular signature, you must enable the signature. Critics signatures are enabled by default. When an attack is detected that matches a signature enabled, the sensor generates an alert.

    Cisco IPS contains 10,000 signatures under construction that you can't change or delete.

    Kind regards
    Rahul Kaikalur
    Network engineer
    Spooster COMPUTER services

  • What are the basic criteria to keep a computer in good operating condition?

    HI: I asked a question before and I will say first my pc works fine and I have no problem.  I want to know, as PC users, what are the basic top of page I should or can do to keep my PC works perfectly.  First: I am a paid version of the anti-malware software and Online Armor for my firewall.  I am running Windows 7 64 bit with IE 9 - I used 10 & 11 and frankly don't like them.  I run more registry cleaner software as I think that was my fall down during the past year, why I had to reinstall my discs of recovery on 12 or more times.  Any basic help and knowledge would be appreciated as I like to learn new things - also if anyone knows of acceptable software that is allowed to run or use to keep your pc running like new thank you Dave

    Hello

    You mention AntiMalware program

    There is a free version of Malwarebytes Anti-Malware program, which works very well.

    It's also a scanner at the request, not a real-time Scanner, to make it work when you want.

    __________________________________________________________

    Registry cleaners can do more damage to your operating system any good they claim to be able to do.

    You should work only in your registry manually and then only if you know what you're doing.

    __________________________________________________________

    Here are the basic steps to take to keep your machine operating smoothly and effective:

    Search for malicious software with the FREE version of this program.

    And does not accept the option "Pay for the version" trial installation

    Download, install, update and scan your system with the free version of Malwarebytes AntiMalware:

    http://www.Malwarebytes.org/products/malwarebytes_free

    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

    You can clean your hard drive using these two methods.

    "Delete files using Disk Cleanup"

    http://Windows.Microsoft.com/en-us/Windows/delete-files-using-disk-cleanup#delete-files-using-disk-cleanup=Windows-7

    Using the free CCleaner program:

    http://www.Piriform.com/CCleaner

    In NO case use the registry cleaning Option in CCleaner

    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

    And it is not recommended to use a register or a program of cleaning/TuneUP/utilities they can do more harm to your any good operating system that they claim to be able to do.

    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

    Make sure you have the latest updated drivers:

    Access the site on your computer or equipment manufacturing > Driver and Software Support Section > search your computer or hardware model number > then your operating system > locate the correct drivers > download and install.

    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

    What are the other steps, which does not include some of the above:

    "Optimize Windows for better performance.

    http://Windows.Microsoft.com/en-us/Windows/optimize-Windows-better-performance#optimize-Windows-better-performance=Windows-7

    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

    It would be a good idea also run the System File Checker tool to check that everything is correct in the system files.

    "How to use the System File Checker tool to fix the files on system missing or corrupted on Windows Vista or Windows 7"

    http://support.Microsoft.com/kb/929833

    Use the (SFC.exe) System File Checker tool to determine which file is causing the problem and then replace the file. To do this, follow these steps:

    1. Open an elevated command prompt. To do this, click Start, click all programs, click Accessories , click command prompt and then click Run as administrator of . If you are prompted for an administrator password or a confirmation, type the password, or click on Allow.
    2. Type the following command and press ENTER:
      /ScannowThe SFC sfc/scannow command analyzes all protected system files and replaces incorrect versions with appropriate Microsoft versions.

    See you soon.

  • What are the programs should run at startup

    Paltalk I still have started from. went to windows to resolve problems by saying that I owe a lot running at startup

    Hello

    These methods allow to check what you have running at startup and use only those you need. Many
    programs will load in a start-up but really they do not need to be loaded automatically
    to work properly.

    How to troubleshoot a problem by performing a clean boot in Windows Vista or
    Windows 7
    http://support.Microsoft.com/kb/929135

    Use advanced tools to solve performance problems in Windows 7 http://www.howtogeek.com/howto/6152/use-advanced-tools-to-troubleshoot-performance-problems-in-windows-7/

    Problems with the overall speed of the system and performance
    http://support.Microsoft.com/default.aspx/GP/slow_windows_performance?p=1

    Use advanced tools to solve performance problems in Windows 7 http://www.howtogeek.com/howto/6152/use-advanced-tools-to-troubleshoot-performance-problems-in-windows-7/

    Problems with the overall speed of the system and performance
    http://support.Microsoft.com/default.aspx/GP/slow_windows_performance?p=1

    How to troubleshoot performance issues in Windows Vista
    http://support.Microsoft.com/kb/950685

    Optimize the performance of Microsoft Windows Vista
    http://support.Microsoft.com/kb/959062
    To see everything that is in charge of startup - wait a few minutes with nothing to do - then right-click
    Taskbar - the Task Manager process - take a look at stored by - Services - this is a quick way
    reference (if you have a small box at the bottom left - show for all users, then check that).

    How to change, add or remove startup programs in Windows 7
    http://www.SevenForums.com/tutorials/1401-startup-programs-change.html

    A quick check to see that load method 2 is - using MSCONFIG then put a list of
    those here.
    --------------------------------------------------------------------

    Tools that should help you:

    Process Explorer - free - find out what are the files, registry keys and other objects processes have
    Open, which DLLs they have loaded and more. This exceptionally effective utility will show same
    you who owns each process.
    http://TechNet.Microsoft.com/en-us/Sysinternals/bb896653.aspx

    Autoruns - free - see what programs are configured so that it starts automatically when your system
    boots and you login. Autoruns shows you the full list of registry and file locations where
    applications can configure Auto-start settings.
    http://TechNet.Microsoft.com/en-us/sysinternals/bb963902.aspx
    Process Monitor - Free - monitor the system files, registry, process, thread and DLL activity in
    in real time.
    http://TechNet.Microsoft.com/en-us/Sysinternals/bb896645.aspx

    There are many excellent free tools from Sysinternals
    http://TechNet.Microsoft.com/en-us/Sysinternals/default.aspx

    -Free - WhatsInStartUP this utility displays the list of all applications that are loaded
    automatically when Windows starts. For each request, the following information
    appears: product Type of startup (registry/Startup folder), Command - Line String,
    Name, file Version, company name, location in the registry or the file system and more.
    It allows you to easily disable or remove unwanted programs that run in your Windows
    startup.
    http://www.NirSoft.NET/utils/what_run_in_startup.html

    There are many excellent free tools to NirSoft
    http://www.NirSoft.NET/utils/index.html

    Window Watcher - free - do you know what is running on your computer? Maybe not. The
    Window Watcher says it all, reporting of any window created by running programs, if
    the window is visible or not.
    http://www.KarenWare.com/PowerTools/ptwinwatch.asp

    Many excellent free tools and an excellent newsletter at Karenware
    http://www.KarenWare.com/

    I hope this helps.

    Rob Brown - MS MVP - Windows Desktop Experience: Bike - Mark Twain said it right.

  • BlackBerry smartphones, what are the benefits of using the spindle to spindle and BBM?

    I have not used BBM again but was compose and send messages pins (peer-to-peer). Is this the same thing as the BBM and what are the benefits of each? Are they better than just SMS?  Would like to have an explanation, because I'm confused!  Thank you!!

    BBM and PIN messages are messages sent from one BlackBerry to another.  The message is composed by the sender and goes through the secure server of the RIM before being delivered to the recipient.  They are only available for BlackBerry users.

    The thing I like about them, it is how you can see if they have been received by the recipient.  Once the message reaches the recipient's phone, you will notice a small would be "at the beginning of your message.  In other words, that it is delivered.  When the recipient opens the message, who had "will change to a 'R' for 'reading'.  So now you know that it is actually received by the recipient.

    One more great thing about these messages, it's that there is no length limit.  As you probably know, most carriers limit SMS 160 characters; not the case with these messages, they can be much longer.

    BBM and PIN messages are of the same type of message, but with PIN messages, you are limited to just contact reception.  With BBM, you can have a lot of contacts on a cat, or you can broadcast a message to multiple contacts at the same time.

    I hope this explains things for you.

Maybe you are looking for