A table can have multiple primary keys. -Technology

1 Answer

Answer :

False If we create multiple primary keys in a table, the primary key will be unable to find the unique key value.

Related questions

Description : Name two possible primary keys for an Employee table. -Technology

Last Answer : Possible primary keys for an Employee table are emp code, emp phone number.

Description : What is the utility of primary key in database? Write distinct features of primary keys. -Technology

Last Answer : The primary key is used to uniquely identify the record in a database. It can be a column or a set of columns in the table.Main features of the primary key are as follows:1. It must contain a unique value for each record of the table.2. It does not contain null values.

Description : A foreign key is a primary key in another table. -Technology

Last Answer : True When a table’s primary key field is added to a related table in order to create the common field which relates two tables, it is called a foreign key in the related table.

Description : What is a primary key in a table? -Technology

Last Answer : A primary key is a special relational database table column (or combination of columns) designated to uniquely identify each & every table record. It does not contain NULL & duplicate values

Description : There are 12 function keys on the keyboard. -Technology

Last Answer : TrueThe keys at the top of a keyboard marked 'F1’ to ‘F12’ are function keys.

Description : Write the shortcut keys to format the text style bold, italic and underline. -Technology

Last Answer : Bold – Ctrl+B, Italic – Ctrl+I, Underline – Ctrl+U

Description : Which of the following shortcut keys brings the cursor to the last cell on the sheet that contains data? -Technology

Last Answer : (b) Ctrl+End shortcut is used to bring the cursor to the last cell.

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : Which of the following statement is true? (1) A Primary key is also a candidate key (2) Each relation has at least one foreign key (3) Foreign keys can’t have null values (4) A Primary key is also an alternate key

Last Answer : Foreign keys can’t have null values

Description : Why'd you leave the keys upon the table?

Last Answer : Moment of absent-mindedness. My hands were full. I meant to come right back and pick them up.

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n ≤ m, the expected number of collisions involving a particular key K is (A) less than 1 (B) less than lg n (C) greater than 1 (D) greater than lg n

Last Answer : (A) less than 1

Description : Fact-less fact table in a data warehouse contains (A) only measures (B) only dimensions (C) keys and measures (D) only surrogate keys

Last Answer : (D) only surrogate keys

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n≤m, the expected number of collisions involving a particular key x is less than ................... (1) 1 (2) 1/n (3) 1/m (4) n/m

Last Answer : Answer: 1

Description : How multiple E_mail addresses are defined in To, Cc, Bcc field? -Technology

Last Answer : By using a comma between E-mail addresses.

Description : How multiple E_mail addresses are defined in To, Cc, Bcc field? -Technology

Last Answer : By using a comma between E-mail addresses.

Description : A two way video conversation among multiple participants is called (a) video chatting (b) video talking -Technology

Last Answer : (c) Two or more people hear and see each other, share the whiteboard and other applications through video conferencing.

Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology

Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.

Description : Which tags divide HTML tables in multiple section? -Technology

Last Answer : , and

Description : To keep better track of multiple Windows, ………….. or tiling is used. -Technology

Last Answer : To keep better track of multiple Windows, cascadingor tiling is used.

Description : The rowspan attribute is used to make a cell span multiple columns. -Technology

Last Answer : False The rowspan attribute is used to make a cell span multiple rows

Description : Can same CSS document be used in multiple XML documents? -Technology

Last Answer : Yes, the same CSS document can be used in multiple XML documents.

Description : In XML, ……….. cannot contain multiple values. -Technology

Last Answer : In XML,attributescannot contain multiple values.

Description : Purchasing of only one licensed copy of a software and distributing/loading it onto multiple systems is called as ………… -Technology

Last Answer : (a) Softlifting is a common type of software piracy in which a legally licensed software program is installed or copied in violation of its licensing agreement.

Description : State any two differences between single row functions and multiple row functions. -Technology

Last Answer : Differences between single row functions and multiple row functions.(i) Single row functions work on one row only whereas multiple row functions group rows(ii) Single row functions return one output per row whereas multiple row functions return only one output for a specified group of rows.

Description : Control Unit is called the ………….. of a computer system. (a) heart (b) nerve centre (c) primary memory (d) All of these -Technology

Last Answer : (b) Nerve centre because it controls the overall processing of a computer system.

Description : …… memory is used to store large amount of information permanently. (a) RAM (b) ROM (c) Secondary (d) Primary -Technology

Last Answer : (c) Secondary memory is used to store large amount of information permanently.

Description : Which of the following statement is false? (a) Secondary storage is faster (b) Primary storage is both volatile and non volatile in nature. -Technology

Last Answer : (a) Secondary memory is the slowest and cheapest form of memory. It cannot be processed directly by the CPU and it must be first copied into RAM.

Description : State the primary goal of a DBMS. -Technology

Last Answer : To provide a convenient and efficient environment in which we can store and retrieve information.

Description : What is a primary key? -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : Define primary key with an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : What is primary key? Give an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : What is a primary key in database? Give an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : Give one advantage of using primary key. -Technology

Last Answer : A primary key uniquely identifies the record in the table.

Description : What is the significance of a primary key? -Technology

Last Answer : A primary key cannot allow null values and must have a unique index.

Description : Which of the following fields will not make a suitable primary key? (a) A customer’s account number -Technology

Last Answer : (b) From the given options, the data field can not be set as a primary key because it can’t be fixed for an object.

Description : Primary key is used to …………….. identify the record. -Technology

Last Answer : Primary key is used to uniquelyidentify the record.

Description : The candidate key, which is not used as primary key is called ………….. key. -Technology

Last Answer : The candidate key, which is not used as primary key is calledalternate key.

Description : Primary key field gives us permission to record duplicate entry. -Technology

Last Answer : False A primary key is a key which identifies records uniquely in a table so it does not give us permission to record duplicate entry.

Description : A primary key field does not allow numbers. -Technology

Last Answer : False Primary key has to identify a unique value which can be present in a table, in a number form also. It means primary key field allow number too.

Description : A primary key value can be NULL. -Technology

Last Answer : False The primary key of table is used to uniquely identify each and every row in the table. So, its all keys and columns must be defined as NOT NULL.

Description : What is a primary key? How do we set a primary key? -Technology

Last Answer : Primary key is the key which is used to uniquely identify the records into the table. To set the primary key you have to follow the steps given below:Step 1 Select the field that you want ... 2 Click Primary Key button from the Design tab.orRight click on the selected field and select Primary Key.

Description : Define primary key. How do you set it in MS_Access? -Technology

Last Answer : Primary key is the key which is used to uniquely identify the records into the table. To set the primary key you have to follow the steps given below:Step 1 Select the field that you want ... 2 Click Primary Key button from the Design tab.orRight click on the selected field and select Primary Key.

Description : …………. is a field which is used as a primary key and numbers each record sequentially. -Technology

Last Answer : AutoNumberis a field which is used as a primary key and numbers each record sequentially.

Description : What are the primary interest of online attackers in spyware? -Technology

Last Answer : Primary interest of online attackers in spyware is using it to steal personal information for financial crimes such as carding and identity theft or to sell that information to someone else who then executes more traditional financial crimes.

Description : Write any one similarity and one difference between primary key and unique Constraint. -Technology

Last Answer : Similarity: Column with both the constraints will only take unique values.Difference: Column with Primary key constraints will not be able to hold NULL values while Column with Unique constraints will be able to hold NULL values.

Description : Identify the primary key column of Train and Reservation. -Technology

Last Answer : (i) Train-TrainIdReservation-RefNo(ii) (d) By default, the UNION operator selects all the values.

Description : Name the primary law in India dealing with cyber crime and electronic commerce. -Technology

Last Answer : The primary law is Information Technology Act 2000.

Description : Write any one similarity and one difference between primary key and unique Constraint -Technology

Last Answer : Similarity: Column with both the constraints will only take unique values.Difference: Column with Primary key constraints will not be able to hold NULL values while Column with Unique constraints will be able to hold NULL values.