1.After an intensive investigation you found out that some users were abusing their privileges. You decide to implement a solution in which users are audited when they create any database object.
2.Using Oracle, outline the steps you will take to accomplish this task.