search
HomeDatabaseOracleLet's talk about how to create a table in Oracle

Oracle database table creation is one of the most basic operations in the Oracle database. This article will introduce the Oracle table creation operation in detail in terms of table creation syntax, data types, primary keys, foreign keys, etc.

Table creation syntax

Oracle table creation syntax is as follows:

CREATE TABLE 
(
     ,
     ,
    ……
     
);

Among them, CREATE TABLE means to create a table, the table name is

, in brackets is the column name and data type of the table. The definition format of each column is , which can have one or more columns.

Table creation operation example

Take creating a students table containing three columns as an example, including the student's ID, name and age:

 CREATE TABLE students
(
    ID INTEGER,
    name VARCHAR2(50),
    age INTEGER
);

Data type

In Oracle, each column needs to define a corresponding data type. Commonly used data types are as follows:

  • CHAR(size): fixed-length string, the maximum length is 2000
  • VARCHAR2(size): Variable length string, the maximum length is 4000
  • NUMBER(p,s): Number with precision and scale, p represents numerical precision, s represents the number of decimal places
  • DATE: Date type, supports date and time storage
  • TIMESTAMP: Timestamp type, supports more precise time storage

Primary key

The primary key is a field used to ensure that each row in the data table can be uniquely identified, and the data in it cannot be repeated. In Oracle, primary keys can be used to effectively improve data retrieval efficiency, and can also be used to ensure data integrity. The primary key can be defined through the following statement:

CREATE TABLE students
(
    ID INTEGER PRIMARY KEY,
    name VARCHAR2(50),
    age INTEGER
);

In the above code, we use PRIMARY KEY to define the ID column as the primary key.

Foreign key

Foreign key is a constraint established between relational database tables to ensure consistency between data tables. In Oracle, foreign keys are often used to define relationships between tables. Foreign keys can be defined through the following statement:

CREATE TABLE customers
(
    ID INTEGER PRIMARY KEY,
    name VARCHAR2(50)
);

CREATE TABLE orders
(
    ID INTEGER PRIMARY KEY,
    date_ordered DATE,
    customer_id INTEGER,
    CONSTRAINT fk_customer_id
    FOREIGN KEY (customer_id) REFERENCES customers(ID)
);

In the above code, we define a foreign key in the orders table, That is the customer_id column. It links the primary key ID of another table customer and uses the name "fk_customer_id" to describe this foreign key relationship. These statements will ensure that every record in the orders table is associated with a record in the customers table.

Summary

If you want to create a table in an Oracle database, you must know Oracle's table creation syntax, data types, primary keys, and foreign keys. This article provides detailed table creation operation procedures and examples, I hope it will be helpful to you.

The above is the detailed content of Let's talk about how to create a table in Oracle. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How do I use cursors in PL/SQL to process multiple rows of data?How do I use cursors in PL/SQL to process multiple rows of data?Mar 13, 2025 pm 01:16 PM

This article explains PL/SQL cursors for row-by-row data processing. It details cursor declaration, opening, fetching, and closing, comparing implicit, explicit, and ref cursors. Techniques for efficient large dataset handling and using FOR loops

How do I create users and roles in Oracle?How do I create users and roles in Oracle?Mar 17, 2025 pm 06:41 PM

The article explains how to create users and roles in Oracle using SQL commands, and discusses best practices for managing user permissions, including using roles, following the principle of least privilege, and regular audits.

How do I use Oracle Data Masking and Subsetting to protect sensitive data?How do I use Oracle Data Masking and Subsetting to protect sensitive data?Mar 13, 2025 pm 01:19 PM

This article details Oracle Data Masking and Subsetting (DMS), a solution for protecting sensitive data. It covers identifying sensitive data, defining masking rules (shuffling, substitution, randomization), setting up jobs, monitoring, and deployme

How do I configure encryption in Oracle using Transparent Data Encryption (TDE)?How do I configure encryption in Oracle using Transparent Data Encryption (TDE)?Mar 17, 2025 pm 06:43 PM

The article outlines steps to configure Transparent Data Encryption (TDE) in Oracle, detailing wallet creation, enabling TDE, and data encryption at various levels. It also discusses TDE's benefits like data protection and compliance, and how to veri

How do I perform online backups in Oracle with minimal downtime?How do I perform online backups in Oracle with minimal downtime?Mar 17, 2025 pm 06:39 PM

The article discusses methods for performing online backups in Oracle with minimal downtime using RMAN, best practices for reducing downtime, ensuring data consistency, and monitoring backup progress.

How do I use Automatic Workload Repository (AWR) and Automatic Database Diagnostic Monitor (ADDM) in Oracle?How do I use Automatic Workload Repository (AWR) and Automatic Database Diagnostic Monitor (ADDM) in Oracle?Mar 17, 2025 pm 06:44 PM

The article explains how to use Oracle's AWR and ADDM for database performance optimization. It details generating and analyzing AWR reports, and using ADDM to identify and resolve performance bottlenecks.

How do I use flashback technology to recover from logical data corruption?How do I use flashback technology to recover from logical data corruption?Mar 14, 2025 pm 05:43 PM

Article discusses using Oracle's flashback technology to recover from logical data corruption, detailing steps for implementation and ensuring data integrity post-recovery.

How do I implement security policies in Oracle Database using Virtual Private Database (VPD)?How do I implement security policies in Oracle Database using Virtual Private Database (VPD)?Mar 13, 2025 pm 01:18 PM

This article details implementing Oracle database security policies using Virtual Private Databases (VPD). It explains creating and managing VPD policies via functions that filter data based on user context, highlighting best practices like least p

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Hot Tools

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function