?
Solved

Candidate Keys - Primary keys in Oracle

Posted on 2013-12-10
5
Medium Priority
?
445 Views
Last Modified: 2013-12-10
This was the interview question I had :

What are candidate keys? Suppose three candidate keys have been identified. Which one will become the primary key? Can all three candidate keys be made into composite primary key?
0
Comment
Question by:d27m11y
  • 2
  • 2
5 Comments
 
LVL 23

Assisted Solution

by:David
David earned 1000 total points
ID: 39708999
Second question, yes, provided the concatenated string that results is unique.

You answered the first question:  candidates are potential primary key fields.  Between the business requirements, and the architect, a selection must be made on what's the best choice.

An Internet search will yield you examples and specifics.

HTH
0
 

Author Comment

by:d27m11y
ID: 39709090
Can I say that candidate key is the key column that uniquely identifies the data in a row and the candidate key could be composite primary key provided it is unique.

Please confirm if I understand right !
0
 
LVL 23

Expert Comment

by:David
ID: 39709170
Correct.  Candidate key is the classroom term, I'm told.  Oracle does not use the term, but does use the concept.
0
 
LVL 32

Accepted Solution

by:
awking00 earned 1000 total points
ID: 39709412
>>Can I say that candidate key is the key column that uniquely identifies the data in a row<<
I would say it slightly differently -
A candidate key is a column or combination of columns that will always define a unique row.
Assume table x has cola, colb, and colc with the following values:
a1, b1, c1
a2, b2, c2
a3, b3, c3
In this case uniqueness can be defined by [cola], [colb], [colc], [cola,colb], [cola,colc], [colb,colc), or [cola,colb,colc]
However, if table x could have a row such as a1, b2, c3, the only candidate key would be [cola,colb,colc]

>>and the candidate key could be composite primary key provided it is unique.<<
Correct as demonstrated above
0
 

Author Closing Comment

by:d27m11y
ID: 39709430
Understood.
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I remember the day when someone asked me to create a user for an application developement. The user should be able to create views and materialized views and, so, I used the following syntax: (CODE) This way, I guessed, I would ensure that use…
Configuring and using Oracle Database Gateway for ODBC Introduction First, a brief summary of what a Database Gateway is.  A Gateway is a set of driver agents and configurations that allow an Oracle database to communicate with other platforms…
This video shows, step by step, how to configure Oracle Heterogeneous Services via the Generic Gateway Agent in order to make a connection from an Oracle session and access a remote SQL Server database table.
This video shows setup options and the basic steps and syntax for duplicating (cloning) a database from one instance to another. Examples are given for duplicating to the same machine and to different machines
Suggested Courses
Course of the Month15 days, 14 hours left to enroll

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question