Define candidate key, alternate key, composite key?

Answer Posted / kumaresan chandran

A candidate key is one that can identify each row
of a table uniquely. Generally a candidate key becomes the
primary key of the table. If the table has more than one
candidate key, one of them will become the primary key, and
the rest are called alternate keys.
A key formed by combining at least two or more
columns is called composite key.

Is This Answer Correct ?    89 Yes 27 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to read and create .LDC data files which are used by linguatic dictionary.

2050


To convert IDMS to DB2, how to deal with IDMS occurs and redefined clause?

3423


fact table and dimension table containg one to many relationship or many to one relastionship

2071


Write the fastest query to find out how many rows exist in a table?

656


Explain the cube operator?

590






How to combine two function together?

1652


Explain about post-relational databases?

576


A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles

6016


Can an extended stored procedure be called from inside a user-defined function?

605


There is a trigger defined for INSERT operations on a table, in an OLTP system. The trigger is written to instantiate a COM object and pass the newly insterted rows to it for some custom processing. What do you think of this implementation? Can this be implemented better?

1982


What is normalization? Explain different levels of normalization?

59775


Explain about the hierarchical model of the database?

574


Explain about the relational database?

602


What is a database development?

512


Which data type cannot be used as a parameter in a udf?

564