Define primary key and candidate key.

2 Answers

Answer :

Primary key: The PRIMARY KEY uniquely identifies each record in a database table. Primary keys must contain unique values. A primary key column cannot contain NULL values. Each table should have a primary key, and each table can have only one primary key. 

Candidate key: A minimal super key is called a candidate key. An entity set may have more than one candidate key. A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is special, and it is called the primary key

Answer :

Primary Key: A primary key is an attribute in Relation that uniquely identifies the rows in relation. A Primary key does not hold NULL values and duplicate values. 

OR

A key which is selected by the designer to uniquely identify the entity is called as Primary key. A primary key cannot contain duplicate values and it can never contain null values inside it.

Example: In a Student table(Rollno,Name,Percentage), Rollno is the primary key

Candidate key: In a relation there may be a key or combination of keys which uniquely identify the record. Such a key is called as Candidate key. 

Example: Consider a Student table (Rollno,Name,Percentage), if (Rollno) and(Name)both are unique then both are identified as candidate keys. 

OR 

Consider a Student table (Rollno, Name, Percentage), if (Rollno, Name) is unique , then (Rollno, Name) can be a candidate key if and only if Name and Rollno individually are not unique. 

Related questions

Description : Define the term Foreign Key. 

Last Answer : A FOREIGN KEY is a key used to link two tables together. A FOREIGN KEY is a field (or collection of fields) in one table that refers to the PRIMARY KEY in another table. It ... between tables because it references the primary key of another table, thereby establishing a link between them.

Description : The candidate key, which is not used as primary key is called ………….. key. -Technology

Last Answer : The candidate key, which is not used as primary key is calledalternate key.

Description : What is the difference between candidate key, unique key and primary key

Last Answer : Candidate keys are the columns in the table that could be the primary keys and the primary key is the key that has been selected to identify the rows. Unique key is also useful for identifying the distinct rows in the table.)

Description : ............. is a combination of two of more attributes used as a primary key A) Composite Key B) Alternate Key C) Candidate Key D) Foreign Key

Last Answer : A) Composite Key

Description : The candidate key is that you choose to identify each row uniquely is called …………….. A) Alternet Key B) Primary Key C) Foreign Key D) None of the above

Last Answer : B) Primary Key

Description : Which one is correct w.r.t. RDBMS? (1) primary key ⊆ super key ⊆ candidate key (2) primary key ⊆ candidate key ⊆ super key (3) super key ⊆ candidate key ⊆ primary key (4) super key ⊆ primary key ⊆ candidate key

Last Answer : Answer: 2

Description : Which of the following statement is true? (1) A Primary key is also a candidate key (2) Each relation has at least one foreign key (3) Foreign keys can’t have null values (4) A Primary key is also an alternate key

Last Answer : Foreign keys can’t have null values

Description : An attribute that uniquely identifies the rows of a table is known as the ....... key. (1) primary (2) candidate (3) composite (4) foreign 

Last Answer : primary

Description : Define the term Data Model.

Last Answer : Underlying structure of the database is called as data model. It is a collection of conceptual tools for describing data, data relationships, data semantics and consistency constraints. Data models define how data is connected to each other and how they are processed and stored inside the system.

Description : Define the term Database Schema

Last Answer : The overall design of the database is called the database schema. A schema diagram displays only names of record types (entities) and names of data items (attributes) and does not show the relationships among the various files. 

Description : Define database model. 

Last Answer : Definition of database model: A database model is a type of data model that determines the logical structure of a database. It also fundamentally determines in which manner data can be stored, organized and manipulated. 

Description : Define Database. List advantages of database system. 

Last Answer : A database is an organized collection of data so that it can be easily accessed, managed and updated. Advantages of database system are the following:  1. Controlling ... Providing Backup and Recovery facilities is provide by DBMS for recovering from hardware or software failures.

Description : Define Constraint. 

Last Answer : Constraints are the rules enforced on the data columns of a table. These are used to limit the type of data that can go into a table. This ensures the accuracy and reliability of the data in ... are applied only to one column, whereas the table level constraints are applied to the whole table. 

Description : Define Domain and Attribute. 

Last Answer : * Domain: All permissible values of attributes are called as a domain. * Attribute: is a property or characteristics of an entity set. 

Description : Define Normalization, list its types.

Last Answer : Normalization is a systematic approach of decomposing tables to eliminate data redundancy(repetition) and undesirable characteristics like Insertion, Update and Deletion Anomalies. It is a multi-step process that ... data from the relation tables. Types of Normalization are: 1NF,2NF,3NF,4NF,5NF

Description : Define Data and instance.

Last Answer : Data: Data can be defined as facts or information that can be recorded and have an implicit meaning.  Instance: The collection of information stored in the database at a particular moment is called an instance of the database.

Description : Define constraints, list types.

Last Answer : Constraints are used to limit the type of data that can go into a table. Constraints are used to ensure accuracy and consistency of data in a relational database.  Types of Constraints : ... Constraint 3.UNIQUE Constraint 4.CHECK Constraint 5.Primary Key Constraint 6. Foreign Key Constraint

Description : Define the term tuple and domain.

Last Answer : tuple: A row is called a Tuple. domain:A domain is a set of all possible (or permissible) values in an attribute. OR  A Domain is defined as a kind of data represented by an attribute.

Description : Define (i) Data Abstraction, (ii) Data Redundancy.

Last Answer : Data abstraction is defined as  *Suppression of details of data organization and storage  *Highlighting of the essential features for an improved understanding of data  *The characteristic that allow ... of data abstraction. This level describes the user interaction with database system. 

Description : State true or false i) A candidate key is a minimal super key. ii) A candidate key can also refer to as surrogate key. A) i-true, ii-false B) i-false, ii-true C) i-true, ii-true D) i-false, ii-false

Last Answer : C) i-true, ii-true

Description : A relation R={A,B,C,D,E,F,G} is given with following set of functional dependencies: F={AD→E, BE→F, B→C, AF→G} Which of the following is a candidate key? (A) A (B) AB (C) ABC (D) ABD

Last Answer : Answer: D

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : What happens if someone votes for a defunct candidate on the Presidental Primary ballot?

Last Answer : You will have wasted your vote. Hell, forget new ballots. They could have hired a few people to just line through the name. Simple.

Description : Define primary key with an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : Define primary key. How do you set it in MS_Access? -Technology

Last Answer : Primary key is the key which is used to uniquely identify the records into the table. To set the primary key you have to follow the steps given below:Step 1 Select the field that you want ... 2 Click Primary Key button from the Design tab.orRight click on the selected field and select Primary Key.

Description : Explain various types of Relational constraints.

Last Answer : Relational Constraints Relational constraints are a set of rules. It is used to maintain the quality of information. Integrity constraints ensure that the data insertion, updating, and other ... - It establishes parent child relationship between two tables. For example :Foreign key constraints 

Description : Explain three level architecture of Database

Last Answer : There are following three levels or layers of DBMS architecture: External Level : Describes part of the database that a particular user group is interested in. Conceptual Level: Describes structure of ... is the one that concerns the way the data are physically stored on the hardware.

Description : Explain advantages of centralized and distributed databases.

Last Answer : Advantage of Centralized databases   * Data integrity is maximized -Data integrity is maximized and data redundancy is minimized because data is stored at a single place.  * Easier Database Administration - ... data is distributed, a group of users can easily share and use data of different sites

Description : Describe the three levels of data abstraction with diagram. 

Last Answer : Three levels of data abstraction are:  Physical level: This is the lowest level of data abstraction. It describes how data is actually stored in database. The complex data structure details ... highest level of data abstraction. This level describes the user interaction with database system.

Description : Describe object-oriented data models.

Last Answer : Object Oriented Model : Object oriented models were introduced to overcome the shortcomings of conventional models like Relational, Hierarchical and network model. An object-oriented database is collection of objects whose ... with other objects. It is also said to be semantic data model.

Description : Distinguish between file processing system and DBMS.

Last Answer : Database Management system File processing system 1. Presence of Self-describing nature of a database system and Metadata. 1. File processing don't contain any self describing feature and ... to use DBMS 5. Controlling Redundancy is one of most important feature to use DBMS

Description : State characteristics of Database.

Last Answer : The Characteristics of Database are: 1. Persistent Data 2. Meta Data and Self-describing nature of a DB 3. Insulation between programs and data (Data Independence) 4. Support ... Sharing of data and multiuser transaction processing 6. Access flexibility and Security. 7. Controlled Redundancy

Description : List types of Database languages.

Last Answer : Four types of database languages are: 1. DDL (Data Definition Language) 2. DML (Data Manipulation Language) 3. DDL (Data Control Language) 4. TCL (Transaction control language)

Description : Describe centralized database system with example. 

Last Answer : Centralized Database System: 1. A centralized database consists of a single data server into which all data are stored and from which all data are retrieved. All the data reside at a single location and ... is cheaper than other types of databases as it requires less power and maintenance. 

Description : Explain client/server database system. 

Last Answer : 1. It has two logical parts client and server.  2. Computer networking allows some task to be executed on a server system and some tasks on client system. This leads to development ... as application server to receive and send requests from client machine to database server and vice versa.

Description : Compare file system and database system. 

Last Answer : File system Database system  1. File processing don't contain any self describing feature and neither posses metadata.  1. Presence of Self-describing nature of a database system and Metadata. ... own file.  5. Controlling Redundancy is one of most important feature to use DBMS

Description : Describe enhanced ER model with the help of example. 

Last Answer : Enhanced ER is a high-level data model that incorporates the extensions to the original ER model. It is created to design more accurate database schemas. EER reflects data properties and constraints more precisely ... example: Square, Circle, Triangle are the sub class of Shape super class. 

Description : Distinguish between network database model and relational database model. 

Last Answer : Network database model Relational database model Relationship between records is expressed in the form of pointers or links Relationship between records is represented by a relation that contains a key for ... logically in the form of rows and columns. Example:  Example: 

Description : List advantages of Normalization. 

Last Answer : List of Advantages of Normalization are the following: 1. More efficient data structure. 2. Avoid redundant fields or columns. 3. More flexible data structure i.e. we should be able to ... 7. Minimizes data duplication. 8. Close modeling of real world entities, processes and their relationships.

Description : List DBMS softwares. 

Last Answer : List of DBMS software are the followings: i. Oracle RDBMS ii. IBM DB2 iii, Microsoft SQL Server iv. MySQL v. MS Access vi. SQLite vii. PostgreSQL viii. MongoDB ix. SQL Developer x. SAP Sybase SE 

Description : Explain distributed database system with example.

Last Answer : A distributed database is a database that consists of two or more files located in different sites either on the same network or on entirely different networks. Portions of the database ... Ignite, Apache Cassandra, Apache HBase, Couchbase Server, Amazon SimpleDB, Clusterpoint, and FoundationDB

Description : Explain Codd’s rules.

Last Answer : Codd rules:  Rule 1: The information rule a has to be presented to the user should be in the form of table.  Rule 2: Guaranteed Access Rule Whole data should be available or ... interface cannot be used to subvert the system, for example, bypassing a relational security or integrity constraint

Description : Explain merits and demerits of Object Oriented Database model.

Last Answer : Object oriented models were introduced to overcome the shortcomings of conventional models like Relational, Hierarchical and network model. An object-oriented database is collection of objects whose behavior, state, ... . * There is no view mechanism * There is no adequate security mechanism.

Description : Explain functional dependency with example.

Last Answer : A functional dependency occurs when one attribute in a relation uniquely determines another attribute. OR Consider a relation say R(X,Y), where X and Y are one or more than one attribute, ... sscper. That is, given rollno of a student, the name and sscper can be determined or searched.

Description : Differentiate between Hierarchical Database model and network database model.

Last Answer : Hierarchical Database Model  Network Model Network Model represents tree like structure with one root. Network Model represents tree like structure with many roots. Reflects 1:N ( ... the use of pointers Record relationship implementation is complex due to the use of pointers

Description : Explain different types of attribute with example and their symbols used in ER diagram.

Last Answer : Different types of attributes are: 1. Simple attribute: A simple attributes are those which cannot be subdivided. Eg:Rollno-  symbol 2. Composite attribute: a composite attribute is ... value can be calculated or determined from another attribute Eg: age from dateofbirth  Symbol

Description : Describe benefits and drawbook of denormalization.

Last Answer : Benefits of denormalization: * Reduce number of relations: It reduce the number of relations because it combines two relations into one new relation. * Reduce number of foreign keys: It reduce number ... : It is always application-specific and needs to be re-evaluated if the application changes. 

Description : Explain Domain constraints with Syntax and example. 

Last Answer : Domain constraints are used to maintain value according to user specification Domain constraints are: 1. Not null-such constraints are applied to an attribute when we have to specify that the ... datatype(size),attr2 datatype(size) constraint nameofconstraint check(attr<value)); or

Description : Explain components of database in detail.

Last Answer : A database system involves four major components. 1. Data 2. Hardware 3. Software 4. Users