Answer Posted / jijnasa behera
Foreign key is the primary key of the other table which is
helpful for referential integrity. it is helpful when we
make join to more than one table.
| Is This Answer Correct ? | 4 Yes | 3 No |
Post New Answer View All Answers
What is the database development process?
How long can an error message be in raiseerror function?
How you can make a parameterized view?
Explain about the hierarchical model of the database?
What are the three types of database design?
How to replace not in with not exist?
When installing the datastage7.5x2 edtion iam getting aproblem i.e the cpu count is 2 but the cpu count in installation is one . how can i install in my p.c (system is dual core).
How to customize error conditions.
Explain the role of indexing in databases?
What you can do to remove data from the cache and query plans from memory for testing the performance of a query repeatedly?
1. Using the XML Document below, with the URI “recipe.xml”
define
the following queries in XQuery:
a.) Give the names of all breakfast in the menu.
b.) Select breakfasts that have price lower than $7.00?
A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles
What is database design and development?
Which data type cannot be used as a parameter in a udf?
explain detail about ftp in datastage?