An attribute that uniquely identifies the rows of a table is known as the ....... key. (1) primary (2) candidate (3) composite (4) foreign 

1 Answer

Answer :

primary

Related questions

Description : The candidate key is that you choose to identify each row uniquely is called …………….. A) Alternet Key B) Primary Key C) Foreign Key D) None of the above

Last Answer : B) Primary Key

Description : ............. is a combination of two of more attributes used as a primary key A) Composite Key B) Alternate Key C) Candidate Key D) Foreign Key

Last Answer : A) Composite Key

Description : Drop Table cannot be used to drop a table referenced by a …………… constraint. A) Local Key B) Primary Key C) Composite Key D) Foreign Key

Last Answer : D) Foreign Key

Description : An IP address is a: a) binary number that uniquely identifies computers. b) also identifies other devices on TCP/IP network c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An IP address is a: a) binary number that uniquely identifies computers. b) also identifies other devices on TCP/IP network c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which of the following statement is true? (1) A Primary key is also a candidate key (2) Each relation has at least one foreign key (3) Foreign keys can’t have null values (4) A Primary key is also an alternate key

Last Answer : Foreign keys can’t have null values

Description : If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called ................ is needed. A) DKNF B) BCNF C) Fourth D) Third

Last Answer : B) BCNF

Description : The Relation Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because : (A) Non key attribute V_name is dependent on V_no which is part of composite key (B) ... Qty_sup is dependent on primary_key unit price (D) key attribute V_ord_no is dependent on primary_key unit price

Last Answer : (A) Non key attribute V_name is dependent on V_no which is part of composite key

Description : In the rules attribute, the………… value helps to display a table border only between rows. -Technology

Last Answer : In the rules attribute, the rows value helps to display a table border only between rows.

Description : A foreign key is a primary key in another table. -Technology

Last Answer : True When a table’s primary key field is added to a related table in order to create the common field which relates two tables, it is called a foreign key in the related table.

Description : Drop Table cannot be used to drop a Table referenced by .................. constraint. (a) Primary key (b) Sub key (c) Super key (d) Foreign key (A) (a) (B) (a), (b) and (c) (C) (d) (D) (a) and (d)

Last Answer : (C) (d)

Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender 

Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows

Description : The candidate key, which is not used as primary key is called ………….. key. -Technology

Last Answer : The candidate key, which is not used as primary key is calledalternate key.

Description : What is the difference between candidate key, unique key and primary key

Last Answer : Candidate keys are the columns in the table that could be the primary keys and the primary key is the key that has been selected to identify the rows. Unique key is also useful for identifying the distinct rows in the table.)

Description : Which one is correct w.r.t. RDBMS? (1) primary key ⊆ super key ⊆ candidate key (2) primary key ⊆ candidate key ⊆ super key (3) super key ⊆ candidate key ⊆ primary key (4) super key ⊆ primary key ⊆ candidate key

Last Answer : Answer: 2

Description : Define primary key and candidate key.

Last Answer : Primary Key: A primary key is an attribute in Relation that uniquely identifies the rows in relation. A Primary key does not hold NULL values and duplicate values.  OR A key which is selected by the ... , Name) can be a candidate key if and only if Name and Rollno individually are not unique. 

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : What is a composite primary key field ?

Last Answer : Answer : A combination of two or more attributes or keys can collectively identify an NTT set, but they are called composite primary keys.

Description : Which attribute tells, how many rows a cell should span? (a) colspan = n (b) rowspan = n -Technology

Last Answer : (b) rowspan = n will tell how many rows a cell should span.

Description : In the ........... normal form, a composite attribute is converted to individual attributes. A) First B) Second C) Third D) Fourth

Last Answer : A) First

Description : The messageChannel class declares the _________ class attribute that defines the key string. a) command_key b) command-key c) commandkey d) Key_command

Last Answer : a) command_key

Description : In a relational database, this is a data structure that organizes the information about a single topic into rows and columns. 1) Block 2) Record 3) Tuple 4) Table 5) Command line interface

Last Answer : Answer :4

Description : What is the minimum number of rows and columns that a word table can have a) 1 row & 1 column b) 2 rows & 2 columns c) Zero d)1 row & 2 columns e) None of The Above

Last Answer : a) 1 row & 1 column

Description : The minimum number of rows and columns that a word table can have, is: a) Zero b) 1 Row and 1 Column c) 1 Row and 2 Columns d) None of The Above

Last Answer : b) 1 Row and 1 Column

Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreaker

Description : A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreake

Description : Which of the following statements identifies the difference between the primary windings and the secondary windings of a 2:1 stepdown transformer? A. The secondary windings have twice as much resistance ... primary windings. D. The secondary windings have half as many turns as the primary windings.

Last Answer : Answer: D

Description : In the periodic table, which term identifies a horizontal row?

Last Answer : ANSWER: PERIOD

Description : In the periodic table, which of the following identifies a horizontal row? w) period x) group y) family z) series

Last Answer : ANSWER: W -- PERIOD

Description : ey to represent relationship between tables is called (A) Primary key (B) Secondary Key (C) Foreign Key (D) None of these

Last Answer : (C) Foreign Key

Description : A foreign key is a reference of the ………….. key in another table. -Technology

Last Answer : A foreign key is a reference of the primary keyin another table.

Description : State true or false i) A candidate key is a minimal super key. ii) A candidate key can also refer to as surrogate key. A) i-true, ii-false B) i-false, ii-true C) i-true, ii-true D) i-false, ii-false

Last Answer : C) i-true, ii-true

Description : A relation R={A,B,C,D,E,F,G} is given with following set of functional dependencies: F={AD→E, BE→F, B→C, AF→G} Which of the following is a candidate key? (A) A (B) AB (C) ABC (D) ABD

Last Answer : Answer: D

Description : Key field is a unique identifier for each record. It is defined in the form of (a) rows (b) columns -Technology

Last Answer : (b) Key is a data item that allows you to uniquely identify individual occurrences which is defined as the column or set of columns.

Description : If an unique key constraint on DATE column is created, will it validate the rows that are inserted with SYSDATE ?

Last Answer : It won't, Because SYSDATE format contains time attached with it.

Description : What do you think poetry uniquely allow us to investigate, to learn, to understand?

Last Answer : I wish this question didn’t sound quite so much like an essay prompt. It’s an interesting topic. Why don’t you tell us your thoughts first—on both the what and the how—and let us respond to them?

Description : What specific behaviors make you uniquely lovable? How did you learn to be that way?

Last Answer : Well, as I have already said, I took Milo to vet's for an enema today. That was both y out of love, and out of fear of my daughter. It turned out to be very much like a changing a baby' ... during my pregnancies. There was no analysis, no thinking, no work involved. The love just was, and still is.

Description : What uniquely odd roadside attraction would you recommend visiting?

Last Answer : The Grandfather Tree in Humboldt County, California is pretty cool. It really is quite large. I know I've visited that on road trips before. Also, the Trees of Mystery in Del Norte County ... and signs and that we've stopped before. Most of those types of things are usually pretty good.

Description : What type of blood capillary located in this sublayer is uniquely suited for absorption of nutrient material?

Last Answer : Feel Free to Answer

Description : PRPP glutamyl amidotransferase, the first enzyme uniquely committed to purine synthesis is feed back inhibited by (A) AMP (B) IMP (C) XMP (D) CMP

Last Answer : Answer : A

Description : Which of the following area of cloud computing is uniquely troublesome? a) Auditing b) Data integrity c) e-Discovery for legal compliance d) All of the mentioned

Last Answer : All of the mentioned

Description : A variable is A. DIM B. Console.Writeline("") C. A uniquely named storage location D. a way of holding a WHOLE number

Last Answer : C. A uniquely named storage location

Description : a tester, what is your main objective in reviewing a requirement document? A. To ascertain that each requirement is traceable to a business need B. To ascertain that each ... business need, testable, and uniquely identifiable D. To ascertain that each requirement is uniquely identifiable

Last Answer : C. To ascertain that each requirement is traceable to a business need, testable, and uniquely identifiable

Description : As a tester, what is your main objective in reviewing a requirement document? A. To ascertain that each requirement is traceable to a business need B. To ascertain that each ... business need, testable, and uniquely identifiable D. To ascertain that each requirement is uniquely identifiable

Last Answer : B. Test objective

Description : Which of the following statements is false? (A) Optimal binary search tree construction can be performed efficiently using dynamic programming. (B) Breadth-first search cannot be used to find connected components of a graph. (C) ... used to find the components of a graph. (1) A (2) B (3) C (4) D 

Last Answer : Answer: 2

Description : What is a primary key in a table? -Technology

Last Answer : A primary key is a special relational database table column (or combination of columns) designated to uniquely identify each & every table record. It does not contain NULL & duplicate values

Description : Consider the following database table : Create table test( one integer, two integer, primary key(one), unique(two), check(one≥1 and ≤10), check(two≥1 and ≤5) ); How many data records/tuples atmost can this table contain ?  (A) 5 (B) 10 (C) 15 (D) 50

Last Answer : (A) 5 

Description : In a relational database model, NULL values can be used for all but which one of the following? (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL. (B) To ... D) To fill a column in a tuple when that column does not really exist for that particular tuple.

Last Answer : (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL.

Description : A website address is a unique name that identifies a specific ___ on the web a) Web browser b) Website c) PDA d) Link e) None of these

Last Answer : a) Web browse