Dear Readers, Welcome to Teradata Objective Questions have been designed specially to get you acquainted with the nature of questions you may encounter during your Job interview for the subject of Teradata MCQs. These objective type Teradata questions are very important for campus placement test and job interviews. As per my experience good interviewers hardly plan to ask any particular question during your Job interview and these model questions are asked in the online technical test and interview of many IT companies.
A. Transactions are write intensive.
B. The number of rows transaction is large.
C. The number of rows per transaction is small.
D. Transactions typically occur within seconds, not minutes.
ANS:: C,D
A. ppl is beneficial in queries specifying range constraints.
B. Ppl is used to enhance performance against small tables.
C. They reduce the number of rows processed by using partition elimination.
D. To store rows using PPL you specify partitioning in the CREATE TABL statement.
ANS:: A,C
A. Unordered data allows for more rows in a data block.
B. Unordered data does not need maintenance to preserve order.
C. Unordered data is independent of any query being submitted.
D. Unordered data requires the use of all AMPs there by increasing the parallelism of the total system.
ANS:: B,C
A. The degree of uniqueness is not critical to efficiency.
B. When choosing a primary index you should pick a column with a severely limited value set.
C. If distribution is skewed an all-AMP operation will take longer than if all AMPs were evenly utilized.
D. Selecting a NUPI for storing data provides for maximum efficiency and makes the best use of the parallel features of Teradata.
ANS:: C
A. Join performance.
B. Known access paths.
C. Even data distribution
D. To enforce uniqueness
ANS::A,B
A. Reorganizations are not required
B. Physical partitioning of disk space is not required
C. All related data can be placed in a single physical partition
D. Range distribution must be used to analyze data distribution
ANS:: A,B
A. System
B. Cluster
C. Clique
D. Disk array
ANS:: A
A. Views
B. Tables
C. Macros
D. Triggers
ANS:: A
A. Temporary space is assigned at the table level
B. Temporary space is subtracted from SysAdmin
C. Temporary space is spool space currently not used
D. Temporary space is permanent space currently not used
ANS:: D
A. It breaks down SQL requests into steps
B. It verifies SQL requests for proper syntax
C. It handles output conversion and formatting
D. It can manage up to 120 individual sessions
E. It determines which AMP should Receive a message
ANS:: A,B,D
A. PE
B. AMP
C. BYNET
D. ESCON cables
E. Host Channel Adapter
ANS:: A,D,E
A. 10 GB
B. 30 GB
C. 70 GB
D. 80 GB
ANS:: A
A. It has access to a single vdik
B. It does output conversion and formatting
C. It does the physical work associated with generating an answer set
D. It developes the least expensive plan to return the requested response set
ANS:: A,B,C
A. Mature optimizer
B. Concurrent users
C. Parallel architecture
D. Industry standard access language(SQL)
ANS:: A,C
A. Portable to any platform
B. Parallel aware optimizer
C. Unconditional parallelism
D. Automatic data distribution
ANS:: B,C,D
A. Redundant data storage for fault tolerance
B. Ability to accommodate 32 CPUs on a node
C. Investment protection for application development
D. Increased workload without decreased throughput
ANS:: C,D
A. FastExport
B. Table Rebuild
C. Archive Recovery
D. Teradata Copy Tool
ANS:: C
A. BTEQ
B. TDQM
C. Teradata Manager
D. Teradat SQL Assistant
ANS:: B
A. Tpump
B. BulkLoad
C. Fastload
D. Multiload
ANS:: D
A. Teradata index Wizard
B. Query Capture Database
C. Priority Scheduler Facility
D. Teradata System Emulation Tool
E. Teradata Dynamic Query Manager
ANS:: A,B,C
A. Fallback is associated with AMP cluster
B. Fallback can be specified at the table level
C. Fallback does not require additional disk space
D. Fallback is a data protection scheme that uses cliques
ANS:: A,B
A. It is automatic
B. After images of changed rows are captured
C. Transient journal rows are deleted by a restart
D. Data is returned to its original state after transaction failure
ANS:: A,D
A. A disk failure does not affect performance
B. Missing blocks of data can be reconstructed
C. RAID 5 has a higher space penality than RAID 1
D. Data and parity are striped across a rank of disks
ANS:: A,C
A. Access to all data is maintained
B. Access to some data is maintained
C. System performance remains constant
D. System performance degradation is proportional to clique size
ANS:: A,D
A. Allows for data redundancy
B. Provides scalability to support large amounts of detailed data
C. Allows users to directly update the operational data store (ODS)
D. Provides an integrated environment that supports strategic and tactical queries
ANS:: B,C,D
A. Data access
B. Continuous update
C. Analytical modeling
D. Program modification
E. Event-based triggering
ANS:: B,C,E
A. Ad hoc queries
B. Pre-defined reports
C. Analytical modeling
D. Continuous update
E. Event-based triggering
ANS:: A,B,C
A. Detailed data for a particular use
B. All detailed data for general use
C. Summary data for a particular use
D. Summarized subset of detailed data for general use
ANS:: A,C
A. Minimizes synchronization
B. Reduces departmental politics
C. Provides departmental data control
D. Provides a single view of the business
ANS:: A,D
A. One-AMP
B. Two-AMP
C. Multi-AMP
D. All-AMP
ANS:: B
A. Each data block for a table is read
B. Each data row is accessed only one
C. All data rows are copied into temporary space
D. A random set of data blocks for a table is read
ANS:: A,B
A. The PEs handle session control functions
B. The BYNET sends a communication between the nodes
C. The BYNET sends the answer set back to the application
D. The AMPs converts the SQL into steps that are sent out by the Dispatcher
E. The AMPs retrieves and performs database functions on the requested rows
ANS:: A,B,E
A. Join index
B. Hash index
C. Primary key index
D. Value ordered index
ANS:: A,B,D
A. It is based on the secondary index
B. It is on the partitioning column
C. It is based on the primary key of the table
D. It is based on the primary index of the table
ANS:: D
A. A UPI is the primary key of the table
B. A UPI access is a one AMP operation
C. A UPI guarantees even data distribution
D. A UPI requires no duplicate row checking during loads
ANS:: B,C,D
A. It requires users to know the access path of the data
B. It contains logically related data for a specific purpose
C. It is designed to represent a business and its practices
D. It allows maximum flexibility in selecting and using data
ANS:: C,D
A. Row sequence is specified
B. Rows can have different formats
C. A row is one instance of all columns
D. Duplicate rows are allowed in a table
ANS:: C,D
A. Is application driven
B. Models the process
C. Models the business
D. Is easy to understand
E. Is founded on mathematical set theory
ANS:: C,D,E
A. The order of rows in a table is arbitrary
B. A table can contain only one row formats
C. A table can contain multiple row formats
D. The order of rows in a table is keyed to the primary index
ANS:: A,B
A. Redundant data storage for fault tolerance
B. Ability to accommodate 32 CPUs on a node
C. Investment protection for application development
D. Increased workload without decreased throughput
ANS:: C,D
A. For redundancy
B. To double the request speed
C. So two session connections can be made concurrently
D. So one can accept requests and the other can return responses
ANS:: A
A. Mature optimizer
B. Concurrent users
C. Parallel architecture
D. Industry standard access language (SQL)
ANS:: A,C
A. Shared Nothing
B. Anything Goes.
c. Shared Nothing.
D.Dual Redundent.
ANS:: A
A. The Optimizer is parllel aware
B. only runs on UNIX.
C. Data distrubution is Automatic.
D.Designed around online Transaction Processing.
ANS::A,C,D.
A.Protection on Investment for application Development.
B.Unconditional,quick response times for data quires.
C. Increase workload without decreased through put.
D. Consistent results with inconsistent data.
ANS:: A,C.
A. The Data modal is consistent no mater how much data.
B. Data is organized by what it represents.
C. Data never Skewed.
D. Allows DBA’s to distribute data properly.
A. Based on transational set theory.
B. Exceptional for processing ad hoc quires.Small number of rows for transaction.
C. Small number of rows for transaction.
D. Transaction tipically occur in seconds instead of minutes.
ANS:: C,D.
A.rows
B.columns
c.tables
D.indexes
ANS:A
A.In tera data structure ,a user is similar to data base
B. a user must always have a password
C.in teradata, a data base must always contain tables
D.a tera data database must always have perm space allocated to it
ANS:B
A.Always
B.some times
C.never
ans:b
A.data that is correctly portioned prior to loading
B.tables with an even number of rows.
C.a primary index column with unique values.
D.many tables releated to each other
Ans:C
A.true
B.false
A.Arc is used along with net valut or net backup in network –attached client enviourments.
B.teradata archival utilities can restore data from tape media.
C.arc is aviliable on channel-attached mainframes and network-attched clients.
D.netvalt is available on Microsoft windows, and net backup is available on unix mp-ras.
ANS:D
A.vnet
b.channel connection
C.Bynet
D.MTDP
ANS:C
A.the uniqueness values is a component of the row hash value.
B.in a table that has a nupi all rows with the same nupi values are distributed to the same amp.
C.two primary index values that hash to the same row hash values are called hash synonyms.
D.the output of the hashing alogritham is called the hash map.
ANS:B
A.disk arrays
B.network connections
C.clique setting in software
D.pes
ANS:A
A.the realitional model
B.the teradata database
C.tables distributed acrossampsbased on a nupi
D.The ANSI standard
Ans:A
A.RAID 1 uses mirroring,to provide data protection
B.RAID 1 users partey to provide data protection.
C.RAID 5 uses mirroring to provide data protection
D.RAID 5uses parity to provide data protection.
Ans:D
A.disk arrays
B.Amps
C.cliques
D.Nodes
Ans :d
A.a foreign key always affects how realitional data is distruibutted.
B.A Foreign key value may be non-unique.
C.A Foreign key must exists as a primary key in realted table.
d.A table must have one, and only one,foreign key.
Ans:c
A.provide full –table recovery to a specific point in time.
B.Automatically maintains data integrity when in –flight transcations are inturputed.
C.data is returned to its original state after a traniscation failure.
d.allows continued system operation while an amp is down.
Ans:b
A.are always unique
b.Are used for distributing data
ans:A
A.both primary and secondary indexes can be created any time during the life time of a table.
B. Both primary and secondrey indexes must be specified during table creation.
C.A secondrey index is created when a table is created , and a primary index is created any time during the life time of a table.
D. A primary index is created when a table is created, A secondrey index is created any time during the life time of a table.
Ans:d
A:The average performance of all amps involved
B.The fastest amp involved
C.the slowest amp involved.
D.the sum of all amps are involved
Ans:A
A.true
B.false
Ans:a
A.true
B.FALSE
ANS:A
A.None of these
B.disk failure
C.disk array contoroller failure
D.node failure
Ans:d
A.true
B.false
Ans:b
A.to increase system capacity, you can add hardware to an existing system.
B.You will have to rewrite custom application designed for small systems when you add new hardware to increase system capacity.
c.you can same teradata utilities regardless of system size
D. You can use the same database model until you reach twice the data volume it was designed for.
Ans:c
A.Exclusive
B.Read
C.Write
D.Access
Ans:b