Define candidate key, alternate key, composite key?

Answer Posted / pratik bachchuwar

candidate key: it is the no of uniquely identified column
(or attribute) in a table.


alternate key: it is simply defined as the (no of candidate
key) - (no of primary key in a table).




composite key: it is the group of primary or uniquely
identified key which again unique in other table.

Is This Answer Correct ?    12 Yes 9 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain about relational database management systems?

572


How to use online Backups?

1732


On friday, you issued several insert statements using query analyzer. You then verified the data had been correctly entered with a select statement on monday, your users report that the data is not there what happened?

571


Write short notes on manual refreshes.

2294


How is data stored in dbms?

526






What are data modelling techniques?

529


A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles

6027


What you can do to remove data from the cache and query plans from memory for testing the performance of a query repeatedly?

593


What is a database development?

524


How to customize error conditions.

1706


In which database can extended stored procedures be added?

534


Can an extended stored procedure be called from inside a user-defined function?

615


Explain the rollup operator?

615


Write the fastest query to find out how many rows exist in a table?

666


Pgm A calls Pgm B and pgm B uses cursor, when pgm B is called second time, the program is abending saying the cursor is opened? Why?

2013