Give two examples of referential integrity constraints.

1 Answer

Answer :

rential integrity constraints.

Related questions

Description : . ………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations. A) Entity Integrity Constraints B) Referential Integrity Constraints

Last Answer : B) Referential Integrity

Description : Describe Referential Integrity ?

Last Answer : A rule defined on a column (or set of columns) in one table that allows the insert or update of a row only if the value for the column or set of columns (the dependent value) matches a value ... data and the action to be performed on dependent data as a result of any action on referenced data.

Description : What is Referential Integrity ?

Last Answer : Maintaining data integrity through a set of rules that restrict the values of one or more columns of the tables based on the values of primary key or unique key of the referenced table.

Description : How can you Enforce Referential Integrity in snapshots ?

Last Answer : Time the references to occur when master tables are not in use. Peform the reference the manually immdiately locking the master tables. We can join tables in snopshots by creating a complex snapshots that will based on the master tables.

Description : What are the Referential actions supported by FOREIGN KEY integrity constraint ?

Last Answer : UPDATE and DELETE Restrict - A referential integrity rule that disallows the update or deletion of referenced data. DELETE Cascade - When a referenced row is deleted all associated dependent rows are deleted.

Description : Where the integrity constraints are stored in Data Dictionary ?

Last Answer : The integrity constraints are stored in USER_CONSTRAINTS.

Description : How will you a activate/deactivate integrity constraints ?

Last Answer : The integrity constraints can be enabled or disabled by ALTER TABLE ENABLE constraint/DISABLE constraint.

Description : Can Check constraint be used for self referential integrity ? How ?

Last Answer : ? Yes. In the CHECK condition for a column of a table, we can reference some other column of the same table and thus enforce self referential integrity.

Description : • Describe Referential Integrity?

Last Answer : A rule defined on a column (or set of columns) in one table that allows the insert or update of a row only if the value for the column or set of columns (the dependent value) matches a ... data and the action to be performed on dependent data as a result of any action on referenced data.

Description : What are the Referential actions supported by FOREIGN KEY integrity constraint?

Last Answer : UPDATE and DELETE Restrict – A referential integrity rule that disallows the update or deletion of referenced data. DELETE Cascade – When a referenced row is deleted all associated dependent rows are deleted.

Description : Which if the following is not the type of data integrity. A) Key integrity B) Domain integrity C) Entity integrity D) Referential integrity

Last Answer : A) Key integrity

Description : The student marks should not be greater than 100. This is (A) Integrity constraint (B) Referential constraint (C) Over-defined constraint (D) Feasible constraint

Last Answer : (A) Integrity constraint

Description : In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as: (A) Referential integrity (B) Multi-valued dependency (C) Entity Integrity (D) Functional dependency

Last Answer : (C) Entity Integrity

Description : What is difference between UNIQUE and PRIMARY KEY constraints?

Last Answer : A table can have only one PRIMARY KEY whereas there can be any number of UNIQUE keys. The columns that compose PK are automatically define NOT NULL, whereas a column that compose a UNIQUE is not automatically defined to be mandatory must also specify the column is NOT NULL.

Description : What are various constraints used in SQL?

Last Answer : NULL -NOT NULL -CHECK -DEFAULT

Description : How do you control the constraints in forms ?

Last Answer : Select the use constraint property is ON Block definition screen.BLOCK

Description : What is the use of CONSTRAINTS option in EXP command ?

Last Answer : A flag to indicate whether constraints on table need to be exported.

Description : ………………… is preferred method for enforcing data integrity A) Constraints B) Stored Procedure C) Triggers D) Cursors

Last Answer : A) Constraints

Description : ……………. is a preferred method for enforcing data integrity A) Constraints B) Stored procedure C) Triggers D) Cursors

Last Answer : A) Constraints

Description : An ER Model includes I. An ER diagram portraying entity types. II. Attributes for each entity type III. Relationships among entity types. IV. Semantic integrity constraints that reflects the business rules about data not ... ; IV (B) I&IV (C) I, II & IV (D) I & III

Last Answer : (A) I, II, III & IV

Description : How many Integrity Rules are there and what are they

Last Answer : There are Three Integrity Rules. They are as follows :: a) Entity Integrity Rule :: The Entity Integrity Rule enforces that the Primary key cannot be Null b) Foreign Key Integrity Rule :: ... Intigrity rule is about the complex business processes which cannot be implemented by the above 2 rules.

Description : What is an Integrity Constraint ?

Last Answer : Integrity constraint is a rule that restricts values to a column in a table.

Description : What is an Integrity Constrains ?

Last Answer : An integrity constraint is a declarative way to define a business rule for a column of a table.

Description : What is Authorization and Integrity manager?

Last Answer : It is the program module, which tests for the satisfaction of integrity constraint and checks the authority of user to access data.

Description : Define the “integrity rules”

Last Answer : There are two Integrity rules. ∙ Entity Integrity: States that “Primary key cannot have NULL value” ∙ Referential Integrity: States that “Foreign Key can be either a NULL value or should be Primary Key value of other relation.

Description : Give two examples of how you might determine the structure of the table DEPT.

Last Answer : Use the describe command or use the dbms_metadata.get_ddl package.

Description : Do you enjoy self referential or self-denying loops?

Last Answer : Pulling the rug out from under me will cause me to slit my own throat!

Description : Referential framing used by TV audience connects media with (A) reality (B) falsity (C) negativity (D) passivity

Last Answer : (A) reality

Description : Say two examples of DML, two of DCL and two of DDL

Last Answer : Say two examples of DML, two of DCL and two of DDL

Description : Give two methods you could use to determine what DDL changes have been made.

Last Answer : You could use Logminer or Streams

Description : Give the two types of tables involved in producing a star schema and the type of data they hold.

Last Answer : Fact tables and dimension tables. A fact table contains measurements while dimension tables will contain data that will help describe the fact tables.

Description : Name the two files that are created when you generate the form give the filex extension ?

Last Answer : INP (Source File) FRM (Executable File)

Description : How does one give developers access to trace files (required as input to tkprof)? (for DBA)

Last Answer : The "alter session set sql_trace=true" command generates trace files in USER_DUMP_DEST that can be used by developers as input to tkprof. On Unix the default file mask for these files are "rwx r-- -- ... = true Include this in your INIT.ORA file and bounce your database for it to take effect.

Description : Give the stages of instance startup to a usable state where normal users may access it.

Last Answer : STARTUP NOMOUNT - Instance startup STARTUP MOUNT - The database is mounted STARTUP OPEN - The database is opened

Description : Give the reasoning behind using an index.

Last Answer : Faster access to data blocks in a table.

Description : Give the structure of the function ?

Last Answer : FUNCTION name (argument list .....) Return datatype is local variable declarations Begin executable statements Exception execution handlers End;

Description : Give the structure of the procedure ?

Last Answer : PROCEDURE name (parameter list.....) is local variable declarations BEGIN Executable statements. Exception. exception handlers end;

Description : Give built-in routine related to a record groups?

Last Answer : Create_group (Function) Create_group_from_query(Function) Delete_group(Procedure) Add_group_column(Function) Add_group_row(Procedure) Delete_group_row(Procedure) Populate_group(Function) Populate_group_with_query(Function) Set_group_Char_cell(procedure)

Description : Give the Types of modules in a form?

Last Answer : Form Menu Library

Description : Give the equivalent term in forms 4.0 for the following. Page, Page 0?

Last Answer : Page - Canvas-View Page 0 - Canvas-view null.

Description : Can you attach an lov to a field at run-time? if yes, give the build-in name.?

Last Answer : Yes. Set_item_proprety

Description : Give the sequence in which triggers fired during insert operations, when the following 3 triggers are defined at the same block level ?

Last Answer : a. ON-INSERT b. POST-INSERT c. PRE-INSERT

Description : Give the sequence of execution of the various report triggers?

Last Answer : Before form , After form , Before report, Between page, After report.

Description : How can a button be used in a report to give a drill down facility?

Last Answer : By setting the action associated with button to Execute pl/sql option and using the SRW.Run_report function.

Description : The tensor product technique constraints surfaces by two curves. a.2 b.1 c.3 d.4

Last Answer : b.1

Description : 59. Alternative solutions exist of an LP model when a. One of the constraints is redundant b. Objective function equation is parallel to one of the constraints c. Two constraints are parallel d. All of the above

Last Answer : b. Objective function equation is parallel to one of the constraints

Description : 55. If two constraints do not intersect in the positive quadrant of the graph, then a. The problem is infeasible b. The solution is unbounded c. One of the constraints is redundant d. None of the above

Last Answer : a. The problem is infeasible

Description : A linear programm A linear programming model CANNOT be used when whic ing model CANNOT be used when which of the followin h of the following are true? g are true? a)An optimal ... set of linear constraints may be defined d)Cross product relationships exist between two or more decision variables

Last Answer : d)Cross product relationships exist between two or more decision variables

Description : What is the benefit of the expertise of a licensed architect in a virtual environment that does not have the inherent constraints of physics.

Last Answer : Infinite proportions.