Explain about network model?
No Answer is Posted For this Question
Be the First to Post Answer
I HAVE A PI ON COL A THE NEXT DAY I WANT CHANGE THE PI ON COL B? PLS SEND ME THE ANS
What is normalization? Explain different levels of normalization?
8 Answers CG-VAK, Choice Solutions, College School Exams Tests, IBM, Wipro,
Define candidate key, alternate key, composite key?
30 Answers IAS, IBM,
How to replace not in with not exist?
How to read and create .LDC data files which are used by linguatic dictionary.
what is architecture of your datastage project??? i came across this question many times in interviews in specific what can i answer plz help me
Write the fastest query to find out how many rows exist in a table?
hi in which phase of mload can i use .FILLER
If a column is an image value type, how you can compare column values? How can you use this column in join clause?
Explain the role of indexing in databases?
What is a database development?
A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles
Oracle (3259)
SQL Server (4518)
MS Access (429)
MySQL (1402)
Postgre (483)
Sybase (267)
DB Architecture (141)
DB Administration (291)
DB Development (113)
SQL PLSQL (3330)
MongoDB (502)
IBM Informix (50)
Neo4j (82)
InfluxDB (0)
Apache CouchDB (44)
Firebird (5)
Database Management (1411)
Databases AllOther (288)