How does oracle act as odbc and give example for front end, Database Management System

Assignment Help:

How does Oracle act as ODBC and give examples of front end uses with ODBC?

ODBC achieve portability at the level of the executable by introducing an extra level of indirection. All direct interaction with a specific DBMS happens through a DBMS- specific driver. A driver is a software program that translates the ODBC calls into DBMS- specific calls. Drivers are loaded dynamically on demand since the DBMSs the application is going to access are known only at run-time. Available drivers are registered
with a driver manager. The Oracle database driver translates the SQL commands from the application into equivalent commands that the Oracle DBMS understands and takes the result from the DBMS and translate into equivalent form for the application.

Example: Let there be a DSN named EMPLOYEE through, which we want to access the
Oracle database in Visual Basic.
Dim CN As New ADODB.Connection
Dim RS As New ADODB.Recordset
CN.Open "DSN=employee", "scott", "tiger"


Related Discussions:- How does oracle act as odbc and give example for front end

Explain instance and schemas, Explain Instance and schemas? Instances ...

Explain Instance and schemas? Instances and schemas: Databases changes over time as the information is deleted and inserted. The collection of information stored in database

Marketing interface, as a customer service employee explain five measures y...

as a customer service employee explain five measures you would recommend to make even a displeased students patronize the school canteen

What is advantage of two-way association, What is advantage of two-way asso...

What is advantage of two-way association? Two-way association advantages are following: a) Independent of the classes. b) Useful for existing predefined classes that are

What is use of generating such tables, What is use of generating such table...

What is use of generating such tables? How can you create temporary tables? When you require a table only for a short time after that you want it to disappear automatically you

What are called jukebox systems, What are called jukebox systems? Jukeb...

What are called jukebox systems? Jukebox systems have a few drives and numerous disks that can be loaded into single of the drives automatically.

Short note on mid square method of hashing, Short Note on mid Square Method...

Short Note on mid Square Method of hashing? Mid square method of hashing: In the method midsquare hashing, the key is squared and the address selected from the center of the s

Explain b-tree, What is B-Tree? A B-tree eliminates the redundant stora...

What is B-Tree? A B-tree eliminates the redundant storage of search-key values .It permits search key values to appear only once.

Database integrity and database security, Question : (a) Differentiate ...

Question : (a) Differentiate between database integrity and database security (b) Database security involves measures to avoid loss of privacy and loss of confidentiality. D

B+ tree, construct a B+ tree for the following set of key value (2,3,5,7,11...

construct a B+ tree for the following set of key value (2,3,5,7,11,19,23,29,31) in ascending order where the pointers that will fit in one node is as follows:A. four B. six C. eigh

Describe analysis of access paths, Describe analysis of access paths To...

Describe analysis of access paths To describe analysis of access paths, consider an example of the design of a company's employee skills database. A part of the object model fr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd