Define candidate key, alternate key, composite key?
Answer Posted / priyanka vaydande
What do u mean by different attributes?..it can be like
student id and course id which are two different
attributes..yet they form a primary key??
| Is This Answer Correct ? | 0 Yes | 2 No |
Post New Answer View All Answers
I have a few records all are same structures data, I want to store data in multiple targets how
How can you fix a poorly performing query?
What is dbms explain in brief?
You are testing the performance of a query the first time you run the query, the performance is slow. the second time you run the query, the performance is fast. why is this?
Hi my program is accesing data from two db2 databases.what is the bind card for this program to genarate plan? how to specify the two owners and two qualifiers in bind card
Write short notes on manual refreshes.
Why does this query return 0?
Who are end users in dbms?
To convert IDMS to DB2, how to deal with IDMS occurs and redefined clause?
A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles
If a column is an image value type, how you can compare column values? How can you use this column in join clause?
Write the fastest query to find out how many rows exist in a table?
Explain the cube operator?
Which four data types cannot be used as a return type from a user-defined function?
In which table collections errors are stored.