Define candidate key, alternate key, composite key?

Answer Posted / manumole

Candidate key:

Candidate keys for a table includes the set of columns
which satisfies the criteria of a primary key.

Primary key : a column/combination of columns which
uniquely identifies a row and whose values are not null.

Clustered Key:when a combination of columns becomes a
primary key it is called as clustered key.

Alternate keys:the set of columns which is avialble in the
candidate keys and are not selected as primary key.

Eg:Customer table
candidate keys:{ CustomerID, MobNo(defined as not null) }

primary key: if Db designer selected as CustomerID,then
Alternate key is MobNo
Clustered key:if both combination CustomerID- MobNo is
taken as primary key,it is nothing but a clustered key

Is This Answer Correct ?    24 Yes 22 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is DB Development software?

1611


How can you fix a poorly performing query?

620


What are the three types of database design?

539


A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles

6020


To convert IDMS to DB2, how to deal with IDMS occurs and redefined clause?

3427






Explain the cube operator?

596


How would you design a database for an online site, which would average a million hits a day?

574


You have two tables with a one to many join based on a field named id. You need to find records in the parent table that are not represented in the child table. how would you accomplish this?

586


What are the constraints on severity level in raiseerror?

580


Pgm A calls Pgm B and pgm B uses cursor, when pgm B is called second time, the program is abending saying the cursor is opened? Why?

2003


What are the 18 schemas?

607


You are testing the performance of a query the first time you run the query, the performance is slow. the second time you run the query, the performance is fast. why is this?

523


Explain the rollup operator?

610


Any sample or model question of punjab national bank for deputy manger IT or any sample of PNB.any1 plz do send on

1815


How to replace not in with not exist?

1458