What is primary key? Give an example. -Technology

1 Answer

Answer :

A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Related questions

Description : What is a primary key in database? Give an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : Define primary key with an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : Give one advantage of using primary key. -Technology

Last Answer : A primary key uniquely identifies the record in the table.

Description : What is a primary key? -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : What is the significance of a primary key? -Technology

Last Answer : A primary key cannot allow null values and must have a unique index.

Description : What is the utility of primary key in database? Write distinct features of primary keys. -Technology

Last Answer : The primary key is used to uniquely identify the record in a database. It can be a column or a set of columns in the table.Main features of the primary key are as follows:1. It must contain a unique value for each record of the table.2. It does not contain null values.

Description : Which of the following fields will not make a suitable primary key? (a) A customer’s account number -Technology

Last Answer : (b) From the given options, the data field can not be set as a primary key because it can’t be fixed for an object.

Description : Primary key is used to …………….. identify the record. -Technology

Last Answer : Primary key is used to uniquelyidentify the record.

Description : The candidate key, which is not used as primary key is called ………….. key. -Technology

Last Answer : The candidate key, which is not used as primary key is calledalternate key.

Description : Primary key field gives us permission to record duplicate entry. -Technology

Last Answer : False A primary key is a key which identifies records uniquely in a table so it does not give us permission to record duplicate entry.

Description : A primary key field does not allow numbers. -Technology

Last Answer : False Primary key has to identify a unique value which can be present in a table, in a number form also. It means primary key field allow number too.

Description : A primary key value can be NULL. -Technology

Last Answer : False The primary key of table is used to uniquely identify each and every row in the table. So, its all keys and columns must be defined as NOT NULL.

Description : A foreign key is a primary key in another table. -Technology

Last Answer : True When a table’s primary key field is added to a related table in order to create the common field which relates two tables, it is called a foreign key in the related table.

Description : What is a primary key? How do we set a primary key? -Technology

Last Answer : Primary key is the key which is used to uniquely identify the records into the table. To set the primary key you have to follow the steps given below:Step 1 Select the field that you want ... 2 Click Primary Key button from the Design tab.orRight click on the selected field and select Primary Key.

Description : Define primary key. How do you set it in MS_Access? -Technology

Last Answer : Primary key is the key which is used to uniquely identify the records into the table. To set the primary key you have to follow the steps given below:Step 1 Select the field that you want ... 2 Click Primary Key button from the Design tab.orRight click on the selected field and select Primary Key.

Description : …………. is a field which is used as a primary key and numbers each record sequentially. -Technology

Last Answer : AutoNumberis a field which is used as a primary key and numbers each record sequentially.

Description : What is a primary key in a table? -Technology

Last Answer : A primary key is a special relational database table column (or combination of columns) designated to uniquely identify each & every table record. It does not contain NULL & duplicate values

Description : Write any one similarity and one difference between primary key and unique Constraint. -Technology

Last Answer : Similarity: Column with both the constraints will only take unique values.Difference: Column with Primary key constraints will not be able to hold NULL values while Column with Unique constraints will be able to hold NULL values.

Description : Identify the primary key column of Train and Reservation. -Technology

Last Answer : (i) Train-TrainIdReservation-RefNo(ii) (d) By default, the UNION operator selects all the values.

Description : Write any one similarity and one difference between primary key and unique Constraint -Technology

Last Answer : Similarity: Column with both the constraints will only take unique values.Difference: Column with Primary key constraints will not be able to hold NULL values while Column with Unique constraints will be able to hold NULL values.

Description : Describe the use of primary key and unique key constraints with example?

Last Answer : There are two Entity constraints: 1.Primary Key constraint 2. Unique Constraint 1. Primary Key constraint: It is use to avoid redundant/duplicate value entry within the row of specified column in ... TABLE PERSONS (P_ID NUM CONSTRAINT P_UK UNIQUE , FIRSTNAME VARCHAR(20), CITY VARCHAR(20) );

Description : Write the significance of a foreign key. -Technology

Last Answer : A foreign key is used to Establish the relationship between any two tables of RDBMS.

Description : Key field is a unique identifier for each record. It is defined in the form of (a) rows (b) columns -Technology

Last Answer : (b) Key is a data item that allows you to uniquely identify individual occurrences which is defined as the column or set of columns.

Description : A foreign key is a reference of the ………….. key in another table. -Technology

Last Answer : A foreign key is a reference of the primary keyin another table.

Description : Which shortcut key is used to make the selected text italic? (a) Ctrl +I (b) Shift +I (c) F1 + I (d) None of these -Technology

Last Answer : (a) Ctrl+I is the shortcut key to make the selected text italic.

Description : What is the use of Enter and Esc key in a Slide Show? -Technology

Last Answer : Press Enter to move to the next slide and Esc to close the Slide Show.

Description : Set new timing, while rehearsing ……………… key is press. (a) Ctrl+T (b) T (c) M (d) O -Technology

Last Answer : (b) T key is used to set new timing while rehearsing.

Description : What is the shortcut key to display the Microsoft PowerPoint shortcut menu? -Technology

Last Answer : (c) Shift + F10 is the shortcut key to display the PowerPoint shortcut menu

Description : F4 key is used to start a Slide Show. -Technology

Last Answer : FalseF5 key is used to start a Slide Show.

Description : The contents of a cell can be changed by pressing F2 key on keyboard. -Technology

Last Answer : True F2 is a shortcut for making the cell editable.

Description : What is a search engine? Give example of any one search engine. -Technology

Last Answer : A search engine is a Website that lets you search the Internet for Websites on specific topics. Search engines turn the Web into a powerful tool for finding information on any topic. There are ... A search engine provides a wealth of information for professional and personal use. e.g. Google

Description : What is search engine? What is its usage? Give example. -Technology

Last Answer : A search engine is a Website that lets you search the Internet for Websites on specific topics. Search engines turn the Web into a powerful tool for finding information on any topic. There are ... The search engine provides a wealth of information for professional and personal use. e.g. Google

Description : What are HLLs? Give example of some HLLs. -Technology

Last Answer : It is an advanced computer programming language that is not limited to one computer, designed for a specific job and is easier to understand. The main advantage of high level languages over low level languages is ... are easier to read, write and understand, e.g. BASIC, C, FORTRAN, Java and Pascal.

Description : What is database? Give example. -Technology

Last Answer : A collection of related information organized as tables is known as the database, e.g. INGRES, MySQL etc.

Description : What is field in database? Give an example. -Technology

Last Answer : A field is an area, reserved for a specific piece of data. It is also known as an attribute, e.g. Customer_Name.

Description : Distinguish between Number and AutoNumber data type field. Give example of each. -Technology

Last Answer : Distinguishing between Number and AutoNumber dataNumberAutoNumberIt holds numeric values whichare used for calculations.It allows to store numbers thatare automatically generatedfor each record.The field ... for every newcustomer, this field willautomatically increase and willprovide a new number.

Description : What is the significance of icons? Give the example of any three types of icons. -Technology

Last Answer : Icons refer to graphic symbols that represent window elements. The three types of icons are as follows- the application icon, the shortcut icon and the document icon.

Description : What is the use of tag in an HTML table? Give a suitable example. -Technology

Last Answer : The tag creates a table row in an HTML table. A table must have atleast one row and also, it can have as many table rows as you want. A table row is divided into table cells. A table must have atleast one table cell per table row.e.g.CheadXtitle> TR Tag

Description : Control Unit is called the ………….. of a computer system. (a) heart (b) nerve centre (c) primary memory (d) All of these -Technology

Last Answer : (b) Nerve centre because it controls the overall processing of a computer system.

Description : …… memory is used to store large amount of information permanently. (a) RAM (b) ROM (c) Secondary (d) Primary -Technology

Last Answer : (c) Secondary memory is used to store large amount of information permanently.

Description : Which of the following statement is false? (a) Secondary storage is faster (b) Primary storage is both volatile and non volatile in nature. -Technology

Last Answer : (a) Secondary memory is the slowest and cheapest form of memory. It cannot be processed directly by the CPU and it must be first copied into RAM.

Description : State the primary goal of a DBMS. -Technology

Last Answer : To provide a convenient and efficient environment in which we can store and retrieve information.

Description : Name two possible primary keys for an Employee table. -Technology

Last Answer : Possible primary keys for an Employee table are emp code, emp phone number.

Description : A table can have multiple primary keys. -Technology

Last Answer : False If we create multiple primary keys in a table, the primary key will be unable to find the unique key value.

Description : What are the primary interest of online attackers in spyware? -Technology

Last Answer : Primary interest of online attackers in spyware is using it to steal personal information for financial crimes such as carding and identity theft or to sell that information to someone else who then executes more traditional financial crimes.

Description : Name the primary law in India dealing with cyber crime and electronic commerce. -Technology

Last Answer : The primary law is Information Technology Act 2000.

Description : An example of the risk involved in development is a) Key personnel may resign before the product is complete b) The manufacturer of critical components (e.g. the hardware  associated with a ... a fully functional lower-cost  equivalent package e) All of these are risks involved in development.

Last Answer : e) All of these are risks involved in development.

Description : Google Chrome is an example of (a) Web browser (b) Web server (c) HTTP (d) WWW -Technology

Last Answer : (a) Web browser is the program that is used to explore the Internet.Thus, Google Chrome is an example of Web browser.

Description : Which of the following is an example of non_volatile memory? (a) ROM (b) RAM (c) LSI (d) VLSI -Technology

Last Answer : (a) Among given options, ROM is the memory that retains its contents even after the interruption of power so, it is a non-volatile memorv.

Description : Why uploading and downloading a file is required? Explain with example. -Technology

Last Answer : When we need a file which is located at the server end, we have to download the file that means a transmission of the file from the server to the user's computer. Similarly, if we want to ... file or picture on the Internet that means a transmission of the file from the user computer to the server.