Define candidate key, alternate key, composite key?
Answer Posted / zulfiqar ali
ANSWER 22.. 1 A candidate key is the combination of one or
more attributes which is used to identify records uniquely a
candidate can be selected as a primary key.
2 A key which is not selected is called Alternate key.
3 combination of attributes is called composite key.
| Is This Answer Correct ? | 2 Yes | 1 No |
Post New Answer View All Answers
What is the physical representation for a many-to-many relationship?
1. Using the XML Document below, with the URI “recipe.xml”
define
the following queries in XQuery:
a.) Give the names of all breakfast in the menu.
b.) Select breakfasts that have price lower than $7.00?
You are testing the performance of a query the first time you run the query, the performance is slow. the second time you run the query, the performance is fast. why is this?
Explain what a database is?
How to customize error conditions.
How can you fix a poorly performing query?
What is dbms explain in brief?
Explain about xml databases?
What are the main phases of database development?
Explain about query and reporting.
State the acid rules?
Write the fastest query to find out how many rows exist in a table?
How can I detect whether a given connection is blocked?
How to generate OIDS
A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles