1 The syntax of the SQL statement is verified.
2 The data dictionary is searched to verify table and column definitions.
3 The data dictionary is searched to verify security privileges on relevant objects.
4 Parse locks are acquired on the relevant objects.
5 The optimal execution plan is determined.
6 The statement is loaded into the shared SQL area (also known as the library cache) in the shared pool of the system global area (SGA).