What are SERIALLY_REUSABLE and RESTRICT_REFERENCES pragmas and when used?

Hi everyone,
I have recently joined in Discussion forums and My question is about SERIALLY_REUSABLE and RESTRICT_REFERENCES pragmas.
what are these pragmas and when can we use them? please give me practical example as I have understood them
in Oracle documentation but not able to use practically.
It would be greatly appreciated if anyone can help me.
Regards,
Sachin Jaiswal

SERIALLY_REUSABLE : This pragama indicates that, the package states are stored only for the block it is executing. Means teh package states are not stored for the session. In this way the constants defined in the package wont be available for the whole session.
RESTRICT_REFERENCES: This pragma is to check, packaged functions have the expected purity during compilation itself. For example, if you want to assert that a packaged function wont do any db writes, you can use as below.
create package p1 is ..
  function test_fn return number;
  pragma restrict_references(test_fn,wnds)
end p1;

Similar Messages

  • What are SERIALLY_REUSABLE and RESTRICT_REFERENCES pragmas, when can used?

    Hi everyone,
    I have recently joined in Discussion forums and feeling very excited to read blogs.
    My question is about SERIALLY_REUSABLE and RESTRICT_REFERENCES pragmas.
    what are these pragmas and when can we use them?
    It would be greatly appreciated if anyone can answer this.
    Regards,
    Sachin Jaiswal

    Go to http://tahiti.oracle.com, type in your searchwords, choose the database versions you are using and read the results.
    e.g.
    serially_reusable version 11.2
    restrict_references version 11.2
    Also this is not really related to forms, so for this type of question the SQL and PL/SQL forum might be more apropriate:
    PL/SQL
    but as you can see looking up in the documentation brings you answers to your questions in no time ;)
    cheers

  • What are XRE_PATH_POFILE and XRE_PATH_LOCAL_PROFILE used for?

    Can anyone explain how Firefox uses the XRE_PATH_POFILE and XRE_PATH_LOCAL_PROFILE environment variables?
    I recently found a discussion that mentioned them in relation to altering the location of the urlclassifier3.sqlite file. I stupidly failed to note the location of this discussion and now am unable to find it again. (I think it was somewhere in bugzilla.mozilla.org.)
    If I set XRE_PATH_LOCAL_PROFILE before launching Firefox then urlclassifer3.sqlite is relocated to the specified location along with the Cache directory. However I'm looking to deploy this to multiple users and do not want to use it without understanding exactly what is that environment variable is supposed to be used for.
    Google searches for both environment variable names have failed to yield any explanation of what they're used for.

    Hi Wasic,
    all java classes which are needed for the start of weblogic server have to
    be in the CLASSPATH. To this variable belong at least the classes in
    $WEBLOGIC_HOME/lib/weblogic451spXboot.jar and $WEBLOGIC_HOME/classes/boot.
    But there can be more. All classes which have to be loaded by the weblogic
    classloader should only be in a path which you can define by the weblogic
    property "weblogic.class.path". the standard startscript for weblogic server
    uses the environment variable CLASSPATH to define the classpath for the java
    virtuell machine and the WEBLOGIC_CLASSPATH variable to define the classpath
    for the webloic classloader (have a look in the standard script
    "startWebLogic.sh"). EJB´s and servlets should always be in the weblogic
    classpath. You can all weblogic properties like "weblogic.class.path" define
    in the commandline of the jvm with "-D<propertyname=propertyvalue>.
    Greetings from
    Lutz Strobel
    "Globalink" <[email protected]> schrieb im Newsbeitrag
    news:3974c68c$[email protected]..
    What is the diference between
    1. weblogic.class.path (prop file, )
    2. CLASSPATH ,
    3. WEBLOGIC_CLASSPATH
    Are 1 and 3 same?
    Also what files go where? e.g., EJB should be under WEBLOGIC_CLASSPATH, or
    CLASSPATH ?
    Classes which are used to pass info between EJB's and servlets go where?
    What dir are dynamically loaded, and which are not?
    Thanks
    Wasiq Hasan

  • What are the possible LdapException.ErrorCode values when using System.DirectoryServices.Protocols?

    When making Ldap calls using the System.DirectoryServices.Protocols Namespace classes and a request generates an LdapException the ErrorCode property contains a numeric value describing the error. However, I cannot find any documentation describing what
    the possible error codes are and what they mean. Is this documented somewhere?
    Thank you.
    -Dave Herrmann

    That should be the error code returned by the ldap_* native functions:
    https://msdn.microsoft.com/en-us/library/aa367014(v=vs.85).aspx

  • What are ROWID and ROWNUM? Are they stored in database and where?

    Hi All,
    can anybody please answer this question
    What are ROWID and ROWNUM? Are they stored in database and where?
    Thanks,
    Srini

    ROWID can be thought of as a pointer to the physical location (on disk) of the (table) row.
    From a ROWID value, Oracle can extract the file, block-within-that-file and offset-of-the-row-within-that-block. Using these, Oracle can directly access a disk block to retrieve a row.
    ROWNUM is a just sequence number of a row within a result set of a query.
    As said by other repliers, both are not stored. They are 'constructed' when you reference them inside a query.

  • What are valid and invalid email address characters

    What are valid and invalid email address characters in Exchange 2010, for example can you have Conan.O'[email protected] is there a document that shows the valid and invalid sysmbols?

    Hi
        The format of email addresses is
    local-part@domain where the local-part may be up to 64 characters long and the
    domain name may have a
    maximum of 253 characters - but the maximum 256 characters length of a forward or reverse path restricts the entire email address to be no more than 254 characters.<sup id="cite_ref-0">[1]</sup>
    The formal definitions are in RFC 5322 (sections 3.2.3
    and 3.4.1) and RFC 5321 - with a more readable form given in
    the informational RFC 3696<sup id="cite_ref-1">[2]</sup>
    and the associated errata.
    Local part
    The local-part of the email address may use any of these
    ASCII characters
    RFC 5322 Section
    3.2.3:
    Uppercase and lowercase English letters (a–z, A–Z) (ASCII: 65-90, 97-122)
    Digits
    0 to
    9 (ASCII: 48-57)
    Characters
    !#$%&'*+-/=?^_`{|}~ (ASCII: 33, 35-39, 42, 43, 45, 47, 61, 63, 94-96, 123-126)
    Character
    . (dot, period, full stop) (ASCII: 46) provided that it is not the first or last character, and
    provided also that it does not appear two or more times consecutively (e.g. [email protected] is not allowed.).
    Special characters are allowed with restrictions. They are:
    o   
    Space and
    "(),:;<>@[\] (ASCII: 32, 34, 40, 41, 44, 58, 59, 60, 62, 64, 91-93)
    The restrictions for special characters are that they must only be used when contained between quotation marks, and that 3 of them (The
    space, backslash \ and
    quotation mark " (ASCII: 32, 92, 34)) must also be preceded by a backslash
    \ (e.g.
    A quoted string may exist as a dot separated entity within the local-part, or it may exist when the outermost quotes are the outermost characters of the local-part
    (e.g. abc."defghi"[email protected] or
    "abcdefghixyz"@example.com are allowed. Conversely,
    abc"defghi"[email protected] is not; neither is
    abc\"def\"[email protected]). Quoted strings and characters however, are not commonly used.
    RFC 5321 also
    warns that "a host that expects to receive mail SHOULD avoid defining mailboxes where the Local-part requires (or uses) the Quoted-string form".
    The local-part "postmaster" is treated specially - it is case-insensitive, and should be forwarded to the server's administrator. Technically all other local-parts
    are case sensitive, therefore [email protected] and [email protected] specify different mailboxes. However most organizations treat uppercase and lowercase letters as equivalent, and also do not allow use of the technically valid characters
    (space, ? and ^). Organizations are free to restrict the forms of their own email addresses as desired, e.g.,
    Windows Live Hotmail,
    for example, only allows creation of email addresses using alphanumerics, dot (.), underscore (_)
    and hyphen (-).<sup id="cite_ref-2">[3]</sup>
    Systems that send mail must be capable of handling outgoing mail for all valid addresses. Contrary to the relevant standards, some defective systems treat certain
    legitimate addresses as invalid and fail to handle mail to these addresses. Hotmail, for example, refuses to send mail to any address containing any of the following standards-permissible characters:
    !#$%*/?^`{|}~
    Domain part
    The domain name part of an email address has to conform to strict guidelines: it must match the requirements for a
    hostname,
    consisting of letters, digits, hyphens and dots. In addition, the domain part may be an
    IP address
    literal, surrounded by square braces, such as jsmith@[192.168.2.1], although this is rarely seen except
    in email spam.
    Examples
    Valid email addresses
    <tt>[email protected]</tt>
    <tt>[email protected]</tt>
    <tt>[email protected]</tt>
    <tt>much."more\ unusual"@example.com</tt>
    <tt>very.unusual."@"[email protected]</tt>
    <tt>very."(),:;<>[]".VERY."very@\\\ \"very"[email protected]</tt>
    Invalid email addresses
    <tt>Abc.example.com</tt> (an @ character must separate the local and domain parts)
    <tt>[email protected]</tt> (character dot(.) is last in local part)
    <tt>[email protected]</tt> (character dot(.) is double)
    <tt>A@b@[email protected]</tt> (only one @ is allowed outside quotation marks)
    <tt>a"b(c)d,e:f;g<h>i[j\k][email protected]</tt> (none of the special characters in this local part
    is allowed outside quotation marks)
    <tt>just"not"[email protected]</tt> (quoted strings must be dot separated, or the only element making
    up the local-part)
    <tt>this is"not\[email protected]</tt> (spaces, quotes, and backslashes may only exist when within
    quoted strings and preceded by a slash)
    <tt>this\ still\"not\\[email protected]</tt> (even if escaped (preceded by a backslash), spaces, quotes,
    and backslashes must still be contained by quotes)
    Terence Yu
    TechNet Community Support

  • What are advantage and disadvantage for Physical Standy and Logical Standby

    HI,
    What are advantage and disadvantage for Physical Standy and Logical Standby configuration?
    Thanks
    Ken

    Logical standby database
    The key advantage for logical standby databases is that they're opened read/write, even while they're in
    applied mode. That is, they can be used to generate reports and the like. It is indeed a fully functional
    database. Also, additional indexes, materialized views and so on can be created.
    However (this being a disadvantage) not all datatypes are supported.
    Oracle (or more exactly the log apply services) uses the primary database's redo log, transforms them into
    SQL statements and replays them on the logical standby database.
    Physical standby database
    A physical standby database is a byte for byte exact copy of the primary database. This also means that
    rowids stay the same in a physical standby database environment.
    Oracle (or more exactly the log apply services) uses the primary database's redo log to recover the
    physical database.
    A physical standby database might be opened read only; however, the received logs are in this case not
    applied. When the logs are applied, the database is not accessible (it is then in a managed recovery state).
    Regards,

  • What are Validation and simulator

    can any one explain what are Validation and Simulators are ???
    what is there importance and how they work in SAP ??
    Regards,
    Milindkumar

    Are you referring to validation rules and simulations? Whereby validations allow the checking of values and combinations of data as they are being entered in SAP. Because the data is validated before it is posted, only correct information enters the system. For example if you have a cost center X that should not post to account Y. You create a validation that checks to see if cost center X is entered whether the account is Y. If the account is Y the validation will stop the entry from being made.
    Simulations normally are when data is checked for accuracy or verfied before posting. Simulations usually allow the verification of data by displaying that entries that will post or will be created only after the post button or process occurs.

  • What are these and what are they useful for?: and

    I have seen these symbols being used in Java: << and >>, what are they and what do they do?
    Thank you.

    As DrQuincy asks how is this of use over multiplying
    and dividing?In your processor there are often different instructions for shifting, multiplying, and deleteing. Typically the shifting instructions take less time to execute and so using the shifting operator will be faster than multiplying. This assumes the compiler doesn't recognize the situation and optimize it out though.
    The >>,<<,>>>, &,|,and ^ operators are mainly useful when you need to deal with individual bits of data. For instance if you are talking to another system (thats not java) that uses a different method of storing numbers (little endian/big endian etc.), or doing something such as creating parity data for error correction. There are lots of things to do, but most a low level and its rare when you need to use them.

  • What is yield() and when it is called

    what is yield() and when it is called

    yield() does what it says in the documentation.
    It rarely needs to be called. Don't worry about it unless you are doing advanced programming
    You should post your questions to a forum which relates to you question.
    You should also reply to answers given to indicate you have read them or people won't both replying.

  • I have a Mac leopard.  Did a recent recommended update.  When it finished,I restarted then a window came up to enter Master Password.  I don't know what it is  and when I try to enter one, the window shakes and I am unable to use computer at all

    I have a Mac leopard.  Did a recent recommended update.  When it finished,I restarted then a window came up to enter Master Password.  I don't know what it is  and when I try to enter one, the window shakes so I am unable to use computer at all.

    Please confirm exactly what Mac this is, and what 'recent update' you installed.

  • My bookmark icons can be fully seen in bookmark toolbar. But on the address bar and on tab most of the icons are blank and when I open most of the websites, their icons are also blank, too. I've already reinstall the firefox 3.6.3 but it is the same. Plea

    My bookmark icons can be fully seen in bookmark toolbar. But on the address bar and on tab most of the icons are blank and when I open most of the websites, their icons are also blank, too. I've already reinstall the firefox 3.6.3 but it is the same. Please help me. Some of the websites show thier icon normally.
    == User Agent ==
    Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3

    Yes, it doesn't work. I ran in safe mode. nothing changed. I uninstalled Mozilla firefox with only standard removal, no change. I finally uninstalled Mozilla with complete removal and reinstalled it, then it return to normal. Why does this happen? Thanks for your reply.

  • 0.41GB of my iPod Touh 4G' is taken up by something called 'Others'. What are 'Others' and can they be deleted or are they an essential part of the iPod and embedded in it? If not essential how do I go about deleting it to enable me to add other pictures

    0.41GB of my iPod Touch 4G's capacity is taken up by something callked 'Others'. What are 'Others' and will it be o.k to delete them? If so how do I go about doing it as there is no trace of a file on either iTunes or my iPod?

    Other content is typically miscellaneous data used by applications you have installed - could be save data (e.g. for games), or documents you've created. There's no easy way to determine precisely what it is, but the only way to clear it is to either delete it from within the respective application, or remove the associated application altogether - neither of which are typically practical.

  • What are the entities that can be re-used in different servers, SI App, SI instance? And how?

    Greetings,
    What are the entities that can be re-used in different servers, SI App, SI instance? And how?
    e.g. can I use a deployed IQStreamable@app1  into app2?
    can I use a deployed observable/app1/siInstance1/Server1 into another query/app3/siInstance3/server2?
    On the presentation titled "04 – Installing, Deploying and Maintaining the SQL Server 2008 R2 StreamInsight Runtime Engine" with file name SQL10R2UPD05-DECK-04.pptx on ecn.channel9.msdn.com/o9/learn/SQL2008R2TrainingKit/Presentations/SQL10R2UPD05-DECK-04/SQL10R2UPD05-DECK-04.pptx
    It is mentioned one of the deployment option is "Deployment: Standalone Server"
    and it mention the following:
    "Use this option for the following scenarios:
    - Metadata objects need to be shared between applications
      - Event Types
      - Adapter Types
      - Query Templates
    - A data source registered with the server provides an event stream for another existing application"
    Could you please provide good example that explain the above statement?
    Cheers, Muhammad

    First, that statement - and those materials - refer to the "legacy" StreamInsight query/adapter model. They do not refer to how things work with the Reactive model introduced in version 2.1. Specifically, it talks about Dynamic Query Composition (DQC).
    You cannot use a deployed Observable in another instance of StreamInsight. You may be able to use them across applications in the same instance - off the top of my head, I'm not sure. I'm getting ready to get on a plane but will take a look at it later.
    Typically, however, applications act as containers (comparable to .NET AppDomains) so I don't think that you'd be able to do this easily. That said, the code and assemblies
    can be reused across multiple instances/applications. You would have separate instances of the classes involved but you would be able to reuse the query logic. That's a common use case.
    Can you be more specific about your use case and what you are trying to accomplish here? It's possible that there are alternative ways to do what you are trying to do.
    DevBiker (aka J Sawyer)
    Microsoft MVP - Sql Server (StreamInsight)
    If I answered your question, please mark as answer.
    If my post was helpful, please mark as helpful.

  • TS3697 all of my songs are gone and when i try to sync again the sync is 2 seconds long and nothing happens

    all of my songs are gone and when i try to sync again the sync is 2 seconds long and nothing happens plus all of my photos from my computer synced to my phone and i cant delete them and i dont have neough storage PLEASE HELP ABOUT TO CRY

    1. Have you applied sync settings for music to be synced to the iPhpne?
    2. Photos that are synced to the iPhone cannot be deleted directly from the iPhone
    To delete photos and videos from your device
    To delete synced photos and videos
    In iTunes, select the device icon in the Devices list on the left. Click the Photos tab in the resulting window.
    Choose "Sync photos from."
    On a Mac, choose iPhoto or Aperture from the pop-up menu.
    On a Windows PC, choose Photoshop Album or Photoshop Elements from the pop-up menu.
    Choose "Selected albums" and deselect the albums or collections you want to delete.
    Click Apply.

Maybe you are looking for

  • I can't install Windows 98 on a KT6V-LSR

    I used to be able to dual boot Win98 and 2K from different partitions on a single 80Gb hard drive. Needed the Win98 only because my old Matrox capture card has no drivers for the newer OS’s. When I changed my mobo to an MSI KT6V-LSR (Via KT600) I cou

  • Program generated button click

    How can I make my program "click" one of the JButtons in the user interface? I have a menu item and a JButton, both created with a subclassed AbstractAction. Somewhere in my program I want to trigger the same sequence of events which would occur if t

  • Publishing as Handout - Too small

    Captivate V5.5 I want to publish two slides on one page as Handouts. I have selected; "Use table in the output" "2 slides per page" "Include Objects and Questions" When I open the Handout in word, the 2 slides on the one page are very small, almost t

  • LR is Exporting Images VERY NOISY Folder + Smugmug

    Hi! I am a professional Photographer, I recently bought a New Alienware PC, and reinstalled all of my Adobe software and Upgraded to LR5.. My Work Flow usually goes like this.. Import to LR> Export to PS> Save to LR> Export to Smugmug, I went to chec

  • ERROR launching AFTER EFFECT

    Hi i try to launch after effect but now i receive this message Impossible de crᅢᄅer le fichier '/Users/ylegallic/Library/Preferences/Adobe/After Effects/13.2/dummy'. i have Creative cloud and after effect CC ( 2014) running on Mac Yosemite before the