DOC PREVIEW
Rose-Hulman CSSE 333 - Assertions, Views and Programming Techniques

This preview shows page 1-2-3-4-5-6 out of 17 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

PowerPoint PresentationChapter 9FIGURE 9.1 Two views specified on the database schema of Figure 5.5.FIGURE 9.2 C program variables used in the embedded SQL examples E1 and E2.FIGURE 9.3 Program segment E1, a C program segment with embedded SQL.FIGURE 9.4 Program segment E2, a C program segment that uses cursors with embedded SQL for update purposes.FIGURE 9.5 Program segment E3, a C program segment that uses dynamic SQL for updating table.FIGURE 9.6 Importing classes needed for including SQLJ in JAVA programs in ORACLE, and establishing a connection and default context.FIGURE 9.7 JAVA program variables used in SQLJ examples J1 and J2.FIGURE 9.8 Program segment J1, a JAVA program segment with SQLJ.FIGURE 9.9 Program segment J2A, a JAVA program segment that uses a named iterator to print employee information in a particular department.FIGURE 9.10 Program segment J2B, a JAVA program segment that uses a positional iterator to print employee information in a particular department.FIGURE 9.11 Program segment CLI1, a C program segment with SQL/CLI.FIGURE 9.12 Program segment CLI2, a C program segment that uses SQL/CLI for a query with a collection of tuples in its result.FIGURE 9.13 Program segment JDBC1, a JAVA program segment with JDBC.FIGURE 9.14 Program segment JDBC2, a JAVA program segment that uses JDBC for a query with a collection of tuples in its result.FIGURE 9.15 Declaring a function in SQL/PSM.Copyright © 2004 Pearson Education, Inc.Copyright © 2004 Pearson Education, Inc.Chapter 9More SQL: Assertions, Views, and Programming TechniquesSlide 9-3Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.1Two views specified on the database schema of Figure 5.5.Slide 9-4Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.2C program variables used in the embedded SQL examples E1 and E2.Slide 9-5Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.3Program segment E1, a C program segment with embedded SQL.Slide 9-6Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.4Program segment E2, a C program segment that uses cursors with embedded SQL for update purposes.Slide 9-7Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.5Program segment E3, a C program segment that uses dynamic SQL for updating table.Slide 9-8Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.6Importing classes needed for including SQLJ in JAVA programs in ORACLE, and establishing a connection and default context.Slide 9-9Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.7JAVA program variables used in SQLJ examples J1 and J2.Slide 9-10Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.8Program segment J1, a JAVA program segment with SQLJ.Slide 9-11Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.9Program segment J2A, a JAVA program segment that uses a named iterator to print employee information in a particular department.Slide 9-12Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.10Program segment J2B, a JAVA program segment that uses a positional iterator to print employee information in a particular department.Slide 9-13Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.11Program segment CLI1, a C program segment with SQL/CLI.Slide 9-14Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.12Program segment CLI2, a C program segment that uses SQL/CLI for a query with a collection of tuples in its result.Slide 9-15Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.13Program segment JDBC1, a JAVA program segment with JDBC.Slide 9-16Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.14Program segment JDBC2, a JAVA program segment that uses JDBC for a query with a collection of tuples in its result.Slide 9-17Elmasri and Navathe, Fundamentals of Database Systems, Fourth EditionCopyright © 2004 Pearson Education, Inc. FIGURE 9.15Declaring a function in


View Full Document

Rose-Hulman CSSE 333 - Assertions, Views and Programming Techniques

Download Assertions, Views and Programming Techniques
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Assertions, Views and Programming Techniques and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Assertions, Views and Programming Techniques 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?