What are cursors? Explain different types of cursors?
Answer Posted / ramesh
Implicit Cursors --Occurs on behalf of every sql statement
Explicit Cursors --Named Cursors used in Plsql
Paramaeteried Cursors --Pass Paramters to a Named Cursor
Cheers,
Ramesh
| Is This Answer Correct ? | 17 Yes | 6 No |
Post New Answer View All Answers
How can you fix a poorly performing query?
Explain about normal forms?
What is the database development process?
Write short notes on manual refreshes.
Explain about relational database management systems?
You are testing the performance of a query the first time you run the query, the performance is slow. the second time you run the query, the performance is fast. why is this?
What is data modeling with example?
What are the three types of database design?
Explain about the database management systems.
How you can make a parameterized view?
You have a table with three columns: amount1, amount2, and amount3 in a single row only one of these three columns will have a value and the other two will be null. Write a sql query to retrieve the values from these columns?
What are the key features of dbms?
How to use online Backups?
A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles
What are data modelling techniques?