What are the disadvantages of cursors? How can you avoid
cursors?

Answer Posted / rahul kumar

A) In cursors each time you fetch a new row it does a round
trip with the database thereby increase network use and time.

B) There is also restriction on select statements that can be
used in cursors

C) It also uses more resources and temporary memory

Cursors can be avoided with the help of careful
implementation of while loop and other set based operations

Is This Answer Correct ?    13 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain the cube operator?

763


Explain about a primary key?

721


What is dbms and its application?

724


What are the types of database model?

750


If a column is an image value type, how you can compare column values? How can you use this column in join clause?

750






What is data modeling with example?

685


Any sample or model question of punjab national bank for deputy manger IT or any sample of PNB.any1 plz do send on

1982


explain detail about ftp in datastage?

1984


How would you design a database for an online site, which would average a million hits a day?

760


Explain about relational operator join?

780


To convert IDMS to DB2, how to deal with IDMS occurs and redefined clause?

3699


What is an application role and explain a scenario when you would use one?

737


Explain about query and reporting.

1836


A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles

6244


Explain about normal forms?

766