Answer Posted / jijnasa behera
Foreign key is the primary key of the other table which is
helpful for referential integrity. it is helpful when we
make join to more than one table.
| Is This Answer Correct ? | 4 Yes | 3 No |
Post New Answer View All Answers
Hi , any one can help me on the same,this is regarding the Informatica Function doc,i want to know how developer is will develop the mapping. pl forwar the any function doc .just for my references. svlc75@yahoo.co.in
Hi my program is accesing data from two db2 databases.what is the bind card for this program to genarate plan? how to specify the two owners and two qualifiers in bind card
What you can do to remove data from the cache and query plans from memory for testing the performance of a query repeatedly?
If a column is an image value type, how you can compare column values? How can you use this column in join clause?
In which table collections errors are stored.
The count() function always returns a int value type what should you do if you need to count rows from a query which you know will return a value that is too large for an int value type?
How can I detect whether a given connection is blocked?
A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles
You have two tables with a one to many join based on a field named id. You need to find records in the parent table that are not represented in the child table. how would you accomplish this?
How to use online Backups?
Explain the rollup operator?
Explain about xml databases?
Explain about query and reporting.
What are the three types of database design?
How would you design a database for an online site, which would average a million hits a day?