DB Development Interview Questions
Questions Answers Views Company eMail

What are cursors? Explain different types of cursors?

6 22535

What are the disadvantages of cursors? How can you avoid cursors?

2 8106

Explain the general syntax for a SELECT statements covering all the options.

3 4436




What is a join and explain different types of joins?

2 3162

Can you have a nested transaction?

1 1349

What is an extended stored procedure?

1 3155

Can you instantiate a COM object by using T-SQL?

1 2182

What is the system function to get the current user's user id?

3 3474




What are triggers? How many triggers you can have on a table?

Ramco,

2 5685

There is a trigger defined for INSERT operations on a table, in an OLTP system. The trigger is written to instantiate a COM object and pass the newly insterted rows to it for some custom processing. What do you think of this implementation? Can this be implemented better?

1242

What is a self join? Explain it with an example?

TCS,

16 49075

Given an employee table, how would you find out the second highest salary?

9 8185

What is normalization? Explain different levels of normalization?

Wipro, Choice Solutions, IBM, College School Exams Tests, CG-VAK,

8 53897

What is denormalization and when would you go for it?

NBP,

9 31061

How do you implement one-to-one, one-to-many and many-to- many relationships while designing tables?

SQL Star,

1 7552


Post New DB Development Questions






Un-Answered Questions { DB Development }

Hi my program is accesing data from two db2 databases.what is the bind card for this program to genarate plan? how to specify the two owners and two qualifiers in bind card

1000


How to read and create .LDC data files which are used by linguatic dictionary.

1333


How to use online Backups?

999


1. Using the XML Document below, with the URI “recipe.xml” define the following queries in XQuery: a.) Give the names of all breakfast in the menu. b.) Select breakfasts that have price lower than $7.00? Belgian Waffles $5.95 two of our famous Belgian Waffles with plenty of real maple syrup 650 Strawberry Belgian Waffles $7.95 light Belgian waffles covered with strawberries and whipped cream 900 Berry-Berry Belgian Waffles $8.95 light Belgian waffles covered with an assortment of fresh berries and whipped cream 900 French Toast $4.50 thick slices made from our homemade sourdough bread 600 Homestyle Breakfast $6.95 two eggs, bacon or sausage, toast, and our ever-popular hash browns 950

997


explain detail about ftp in datastage?

1063






There is a trigger defined for INSERT operations on a table, in an OLTP system. The trigger is written to instantiate a COM object and pass the newly insterted rows to it for some custom processing. What do you think of this implementation? Can this be implemented better?

1242


What is normalization? Explain different levels of normalization?

53897


How to generate OIDS

959


To convert IDMS to DB2, how to deal with IDMS occurs and redefined clause?

2476


I HAVE A PI ON COL A THE NEXT DAY I WANT CHANGE THE PI ON COL B? PLS SEND ME THE ANS

1409


A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles

5062


How to combine two function together?

1031


Any sample or model question of punjab national bank for deputy manger IT or any sample of PNB.any1 plz do send on

1097


Explain about query and reporting.

1046


Write short notes on manual refreshes.

1682