by: Ping |
last post by:
Hello,
Have a wonderful new year!
I have oracle 9.2 on XP.
There is a table T1 created by user U1 in U1's schema,
a synonym S1 created also by U1 to point to T1 in U1's schema,
U1 granted...
|
by: Ray |
last post by:
DB2 V7.2
Is it possible to list applications connected to a node by Auth ID?
Is it possible to force applications connected to a node by Auth ID or
am I forced to use App. Handle?
Thanks,
Ray
|
by: Matt |
last post by:
How do we define systems programs? when we say systems programming,
does it necessary mean that the programs we write need to interact
with hardware directly? For example, OS, compiler, kernel,...
|
by: J. Babe |
last post by:
I am populating a drop down list with a privilege levels from a table
called "Privilege" with the fields "PrivilegeID" and "PrivilegeName".
In a table named "Users", their is a corresponding column...
|
by: Praveen_db2 |
last post by:
Hi All
I need to give authrization/Privilege for a user such that he should be
able to run stored procedures but cannot change its code i.e he should not
be able to compile it.I looked in the...
|
by: Parv |
last post by:
I am impersoanting a user to an other domain. But while doing so i am
getting
A required privilege is not held by the client
exception. I have tried with aal possible usernames and passwords...
|
by: jatinder.saundh |
last post by:
Hi,
How do I give create database privielege to a specific user/group at a
particular db2 instance ?
I read about various authorities like SYSCTRL etc. but I am interested
in giving only Create...
|
by: Laurence |
last post by:
Hi folks,
In the middle of page 231 on the book "Administration Guide -
Implementation" stated - "In addition to these package privileges, the
BINDADD database privilege allows users to create...
|
by: abhishek.gilra |
last post by:
Does anyone know how to add users to the log on locally list in User
Rights Management inside Local Security settings.
Thanks
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|