473,657 Members | 2,953 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

GRANT TEMPORARY ON DATABASE to Public

This is standard when just create a db,
but how long do these temporary objects survive?
(eg public user creates a table)
It's longer than the session,
contrary to create temporary table x..

tnx,
Nov 23 '05 #1
0 925

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

14
1991
by: Martin v. Löwis | last post by:
The Python Software Foundation is seeking grant proposals for projects related to the further development of Python, Python-related technology, and educational resources. The PSF plans to issue calls for proposals regularly. Proposals should be for specific projects with a clear objective, rather than support for ongoing activities. Proposals should be brief (a few pages of text), and they should explain: a. what the objective of the...
1
6513
by: kong | last post by:
I created a package using pl/sql. In this package i have a dblink to another Database, call it DB2. Meanwhile, Server2 has a DBlink to another Database, call it DB3. Within my package, i have a sql that link to these DB2's view. In the View of this DB2, it call a function from DB3 and take the data from the DB3. I run this package in few locations. This package run fine except for one location.
0
10578
by: Charles Cantrell | last post by:
I have recently set up mySQL on a Mandrake release of Linux (Version 7 of Mandrake, I believe), using the binary 4.0.13 standard release. The set up and start up all were normal, as far as I could tell, with no warnings or error messages. In nearly all respects, the database appears to be running as expected. I have the book "PHP and mySQL Web Development" by Luke Welling and Laura Thomson, and have been working through the examples...
0
1072
by: david walcroft | last post by:
I'm trying to use a grant command on a redhat 9 v:3.23.56-1.9 :- " grant create temporary tables on iptables.* to iptables_user@localhost identified by 'xxx' " And I get this syntax error, to which I cannot find the answer. ERROR 1064: You have an error in your SQL syntax near 'temporary tables on iptables.* to iptables_user@localhost identified by 'xxx' at line 1
2
2454
by: Andy S. | last post by:
Hi, I'm trying to declare and use temporary tables. I have written the following code in Java. Creating the tablespace (i can see the tablespace created using the Control Center), the temporary table and even inserting the values execute fine (even the executeUpdate while inserting returns a positive number indicating that rows have been inserted). However, when I select * from the temporary table, 0 rows are returned and the while loop...
7
3003
by: Krisa | last post by:
I've begun using the technique of putting temporary tables in a temporary database in my C:\Temp folder. Everything is fine except I can't kill the database when exiting Access. I get a "Permission Denied", even if I just open and then close the main database without creating any temporary tables. Why, oh why? Thanks, Krisa
2
1534
by: Brian O'Haire | last post by:
Any help would be appreciated: I have a routine on an asp.net web page, This code below point to a text box called lbtable. public void GetTables( ) { //string TblDName = new string; //string TblDType = new string;
0
923
by: Loeke | last post by:
This is standard when just create a db, but how long do these temporary objects survive? (eg public user creates a table) It's longer than the session, contrary to create temporary table x.. tnx,
6
26410
by: john_woo | last post by:
Hi, db2 GRANT all on a_table_name to user me is for a table, I'm wondering possible to grant all on all_tables to user me, without listing all tables' names? -- Thanks John
0
4423
by: unixNAB | last post by:
MySQL 5.0.x Hello, I'm trying to work out but the MySQL reference guide to the grant syntax is a little off, it says... so i wanted to do something like grant all on %_log.* to .......; and also tried
0
8820
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
8718
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8499
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8601
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
6162
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5630
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4300
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2726
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
1601
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.