What is the utility of primary key in database? Write distinct features of primary keys. -Technology

1 Answer

Answer :

The primary key is used to uniquely identify the record in a database. It can be a column or a set of columns in the table.Main features of the primary key are as follows:1. It must contain a unique value for each record of the table.2. It does not contain null values.

Related questions

Description : What is a primary key in database? Give an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : Public key system is useful because a. it uses two keys. b. there is no key distribution problem as public key can be kept in a commonly accessible database. c. private key can be kept secret. d. it is a symmetric key system. 

Last Answer : b. there is no key distribution problem as public key can be kept in a commonly accessible database.  

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : Name two possible primary keys for an Employee table. -Technology

Last Answer : Possible primary keys for an Employee table are emp code, emp phone number.

Description : A table can have multiple primary keys. -Technology

Last Answer : False If we create multiple primary keys in a table, the primary key will be unable to find the unique key value.

Description : Write any one similarity and one difference between primary key and unique Constraint. -Technology

Last Answer : Similarity: Column with both the constraints will only take unique values.Difference: Column with Primary key constraints will not be able to hold NULL values while Column with Unique constraints will be able to hold NULL values.

Description : Write any one similarity and one difference between primary key and unique Constraint -Technology

Last Answer : Similarity: Column with both the constraints will only take unique values.Difference: Column with Primary key constraints will not be able to hold NULL values while Column with Unique constraints will be able to hold NULL values.

Description : Explain Database Management. What are the features of DBMS? -Technology

Last Answer : It refers to the software that is responsible for storing, maintaining and utilising a database. It enables a user to define, create and maintain the database and provide controlled access on it. A ... Data security e.g. MS-Access, Corel Paradox, Lotus Approach, MySQL, OpenOffice.org Base etc.

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : Which of the following statement is true? (1) A Primary key is also a candidate key (2) Each relation has at least one foreign key (3) Foreign keys can’t have null values (4) A Primary key is also an alternate key

Last Answer : Foreign keys can’t have null values

Description : Write the shortcut keys to format the text style bold, italic and underline. -Technology

Last Answer : Bold – Ctrl+B, Italic – Ctrl+I, Underline – Ctrl+U

Description : What do you understand by network utilities? Write some cpmmands to start a network utility? -Technology

Last Answer : Network utilities provide a way to check the connectivity of a network and log events while using the Internet, ipconfig, ping, spray etc., are some commands to start a network utility.

Description : What are the two distinct stages of message transmission in the two step flow theory? -Technology

Last Answer : The Two Step Flow theory proposed by Paul Lazarsfeld, states that messages from the media get transmitted in two distinct stages:1. Through Opinion Leaders who pay close attention to the mass ... 2. These opinion leaders then pass their own interpretations in addition to the actual media content.

Description : What is a primary key? -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : Define primary key with an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : What is primary key? Give an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : Give one advantage of using primary key. -Technology

Last Answer : A primary key uniquely identifies the record in the table.

Description : What is the significance of a primary key? -Technology

Last Answer : A primary key cannot allow null values and must have a unique index.

Description : Which of the following fields will not make a suitable primary key? (a) A customer’s account number -Technology

Last Answer : (b) From the given options, the data field can not be set as a primary key because it can’t be fixed for an object.

Description : Primary key is used to …………….. identify the record. -Technology

Last Answer : Primary key is used to uniquelyidentify the record.

Description : The candidate key, which is not used as primary key is called ………….. key. -Technology

Last Answer : The candidate key, which is not used as primary key is calledalternate key.

Description : Primary key field gives us permission to record duplicate entry. -Technology

Last Answer : False A primary key is a key which identifies records uniquely in a table so it does not give us permission to record duplicate entry.

Description : A primary key field does not allow numbers. -Technology

Last Answer : False Primary key has to identify a unique value which can be present in a table, in a number form also. It means primary key field allow number too.

Description : A primary key value can be NULL. -Technology

Last Answer : False The primary key of table is used to uniquely identify each and every row in the table. So, its all keys and columns must be defined as NOT NULL.

Description : A foreign key is a primary key in another table. -Technology

Last Answer : True When a table’s primary key field is added to a related table in order to create the common field which relates two tables, it is called a foreign key in the related table.

Description : What is a primary key? How do we set a primary key? -Technology

Last Answer : Primary key is the key which is used to uniquely identify the records into the table. To set the primary key you have to follow the steps given below:Step 1 Select the field that you want ... 2 Click Primary Key button from the Design tab.orRight click on the selected field and select Primary Key.

Description : Define primary key. How do you set it in MS_Access? -Technology

Last Answer : Primary key is the key which is used to uniquely identify the records into the table. To set the primary key you have to follow the steps given below:Step 1 Select the field that you want ... 2 Click Primary Key button from the Design tab.orRight click on the selected field and select Primary Key.

Description : …………. is a field which is used as a primary key and numbers each record sequentially. -Technology

Last Answer : AutoNumberis a field which is used as a primary key and numbers each record sequentially.

Description : What is a primary key in a table? -Technology

Last Answer : A primary key is a special relational database table column (or combination of columns) designated to uniquely identify each & every table record. It does not contain NULL & duplicate values

Description : Identify the primary key column of Train and Reservation. -Technology

Last Answer : (i) Train-TrainIdReservation-RefNo(ii) (d) By default, the UNION operator selects all the values.

Description : Consider the following database table : Create table test( one integer, two integer, primary key(one), unique(two), check(one≥1 and ≤10), check(two≥1 and ≤5) ); How many data records/tuples atmost can this table contain ?  (A) 5 (B) 10 (C) 15 (D) 50

Last Answer : (A) 5 

Description : In a relational database model, NULL values can be used for all but which one of the following? (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL. (B) To ... D) To fill a column in a tuple when that column does not really exist for that particular tuple.

Last Answer : (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL.

Description : Write the relationship between a database and a table. -Technology

Last Answer : A database contains multiple tables whereas, a table cannot exist outside a database.

Description : Write any two advantages of using database. -Technology

Last Answer : 1. Can ensure data security.2. Reduces the data redundancy.

Description : Write any two uses of database management system. -Technology

Last Answer : 1. DBMS is used to store data at a centralized location.2. It is used to minimize data redundancy and data inconsistency.

Description : Define database management system. Write two advantages of using database management system for school. -Technology

Last Answer : Database Management System (DBMS) is a collection of programs that enable users to create, maintain database and control all the access to the database. The primary goal of the DBMS is to ... centralized location.2. It provides security to the personal information of the school, stored in it.

Description : Write the steps to design a database. -Technology

Last Answer : Steps to Design a DatabaseThere are various steps to design a database which are as follows:Step 1 Determine the purpose of your database The first step of designing a database is to determine the ... that the database structure meets the goals you needed, add all your existing data to the tables.

Description : In a Bank’s database, there are two tables ‘Customer’ and ‘Transaction’ as shown below. Write a query to display customer’s name who has -Technology

Last Answer : (i) Select cust_name from customer c,transaction t where c.Acc_No=t.Acc_No and Transaction_Type= 'Debit';(ii)Select cust_name, t.* from customer c, transaction t where c.Acc_No=t.Acc_No;(iii) ... total amount of all type of transactions, it will only display the total of credit transactions only.

Description : There are 12 function keys on the keyboard. -Technology

Last Answer : TrueThe keys at the top of a keyboard marked 'F1’ to ‘F12’ are function keys.

Description : Which of the following shortcut keys brings the cursor to the last cell on the sheet that contains data? -Technology

Last Answer : (b) Ctrl+End shortcut is used to bring the cursor to the last cell.

Description : Define a utility software. -Technology

Last Answer : A utility software is a system software designed to help in the management and tuning of operating systems, computer hardwares and different application softwares.

Description : Mention some examples of utility software. -Technology

Last Answer : Data compression utilities, virus protection utilities and disk defragmentation utilities.

Description : Explain any one utility software. -Technology

Last Answer : It is a system software designed to help in management and tuning of operating systems, computer hardwares and different application softwares.A single piece of utility software is ... include Disk Compression, Backup, Virus Protection Utilities (Antivirus), Disk Defragmentation Utilities etc.

Description : What is the use of network utility? -Technology

Last Answer : Network utility analyses the computer’s network connectivity, configure network settings, check the data transfer or log events. It works for the router to check whether the network is connected or not and other technical issues.

Description : Describe utility software and also define its types. -Technology

Last Answer : It is a system software designed to help in management and tuning of operating systems, computer hardwares and different application softwares.A single piece of utility software is usually called a ... file system which can be mounted by the operating system and treated as an individual drive.

Description : This part of utility software is used to prevent phosphor burning on computer monitors by blanking the screen with moving images. -Technology

Last Answer : (d) Screensavers fill the computer screen with moving images or patterns, when the computer is not in use.

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : Which of the following is not related to a utility software? (a) Text editor (b) Antivirus program (c) Disk compression software -Technology

Last Answer : (d) Railway reservation system is an example of application software whereas, rest all are software utilities.

Description : Explain the utility of comments in XML. -Technology

Last Answer : A comment is a note or information that appears in the code of an XML document to help you understand the code better. Comments are not displayed in the output. They are not part of the program and therefore, are not parsed by the XML parser.