Define candidate key, alternate key, composite key?
Answer Posted / ramesh
A composite Key can be either Primay or Unique Key
More then One Key columns are said to be composite keys
Candidate Key(Primary Key) is a Key which Maintains the Row
Uniue .Can be defined based on the Entity
Alternate Key or Unique Key is similar to PK ,except it
accepts null Values .So that the records can still be
entered submitting null values to this attribute.
| Is This Answer Correct ? | 151 Yes | 207 No |
Post New Answer View All Answers
Explain about post-relational databases?
What is the maximum length of an extended property?
How to customize error conditions.
There is a trigger defined for INSERT operations on a table, in an OLTP system. The trigger is written to instantiate a COM object and pass the newly insterted rows to it for some custom processing. What do you think of this implementation? Can this be implemented better?
Explain the rollup operator?
Explain about query and reporting.
What are the 18 schemas?
How long can an error message be in raiseerror function?
How to use timestamp datatypes
How to read and create .LDC data files which are used by linguatic dictionary.
Write short notes on manual refreshes.
Can an extended stored procedure be called from inside a user-defined function?
A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles
Explain the role of indexing in databases?
In which database can extended stored procedures be added?