Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the physical representation for a many-to-many relationship?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More DB Development Interview Questions

explain detail about ftp in datastage?

0 Answers   IBM,


A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles

0 Answers  


How can I detect whether a given connection is blocked?

0 Answers  


What is data modeling with example?

0 Answers  


Explain the general syntax for a SELECT statements covering all the options.

3 Answers  


what is the use of foreginkey

2 Answers  


What are the disadvantages of cursors? How can you avoid cursors?

2 Answers  


How to read and create .LDC data files which are used by linguatic dictionary.

0 Answers  


Can an extended stored procedure be called from inside a user-defined function?

0 Answers  


What is a self join? Explain it with an example?

16 Answers   TCS,


Explain about relational database management systems?

0 Answers  


how will I find the duplicate rows count from employees tablein oracle.

2 Answers  


Categories