Define candidate key, alternate key, composite key?
Answer Posted / shiv om mishra
candidate key- is a combination of two attributes taht can be uniquely used to identify a datbase record without any extraneous data.
Each table may have one or more candidate key.
A candidate key of a relation tells us all teh set of all its attribute is a superkey.
| Is This Answer Correct ? | 3 Yes | 5 No |
Post New Answer View All Answers
What are the constraints on severity level in raiseerror?
How can you fix a poorly performing query?
I have a few records all are same structures data, I want to store data in multiple targets how
State the acid rules?
Explain about the relational database?
To convert IDMS to DB2, how to deal with IDMS occurs and redefined clause?
Explain about the database management systems.
What are the three basic rules which are to be followed for the relational model of the database?
Can an extended stored procedure be called from inside a user-defined function?
A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles
How to read and create .LDC data files which are used by linguatic dictionary.
If a column is an image value type, how you can compare column values? How can you use this column in join clause?
What is a database development?
Explain about post-relational databases?
What is normalization? Explain different levels of normalization?