Sie sind auf Seite 1von 4

COMPUTER SCIENCE

CHAPTER 3 (2 ND YEAR)

1:

2:
4:
5:
6:
7:

8:
9:
10:
11:

12:
13:
14:

15:

16:

A type of normalization in which all the tables used must have a primary key defined is
called _____________.
(a) Normal Data Form
(b) First Normal Form
(c) Data Correctness
(d) Database Protection
____________ states that no attribute of a primary key should contain null value.
(a) Data Correctness
(b) Entity Integrity
(c) Transitive dependency
(d) Data Operation
____________ are removed at the end of second normal form.
(a) Processes
(b) Homonym
(c) Conditionality
(d) Anomalies
____________ dependency is removed in third normal form.
(a) Transitive
(b) Non Functional
(c) Anomaly
(d) Correctness
____________ groups are removed during the first normal form.
(a) Data Operation
(b) Data Consistency
(c) Repeating
(d) Data Security
A relation R can be in ____________ if and only if all underlying domains contains
atomic values.
(a) Database Protection
(b) Additional Normal Form
(c) First Normal Form
(d) Data Correctness
Partial functional dependency creates redundency in the table which results in certain ______.
(a) Anomalies
(b) Dependency
(c) Synonym
(d) Consistency
____________ is the process based on the analysis of functional dependency.
(a) Normalization
(b) End User
(c) Consistency
(d) Security
Normalization is a process of converting the complex data structures into __________.
(a) Transitive Data Structure
(b) Database Structure
(c) Neural Data Structure
(d) Stable Data Structures
____________ dependency exists if one or more non key attributes are dependant on the
primary key.
(a) Partial Functional
(b) Software Functional
(c) Functional View
(d) Operation Functional
Quality data is a concern of ____________.
(a) Entity Integrity
(b) Data Consistency
(c) Data Protection
(d) Stable Data structure
A ___ is a functional dependency in a relation between two or more non key attributes.
(a) Correctness Dependency
(b) Transitive Dependency
(c) Anomaly Dependency
(d) Synonym Dependency
The process by which we can convert the complex data structures into simple data
structure is ____________.
(a) Query
(b) End User
(c) Normalization
(d) Anomaly
A relation R can be in ____________ if and only if all the underlying domains contains
atomic values.
(a) First Normal Form
(b) Transitive dependency
(c) Data Correctness
(d) Database Protection
____________ is created when two different names are used for the same information.
(a) Mutually Exclusive
(b) Data Security
(c) Synonyms
(d) Anomaly
Page 1 of 4

17:
18:
19:
20:
21:

22:
24:
25:
26:
27:

28:
29:
30:
31:
33:
34:
35:
36:

____________ involvs two important constraints in relational databases.


(a) Data Security
(b) Data Correctness
(c) Data Consistency
(d) Data Integrity
All the tables must have a primary key defined is a process of ____________.
(a) First Normal Form
(b) Additional Normal Form
(c) Consistent Normal Form
(d) Functional Dependency
____________ must refer to the primary key in another table or it must be null.
(a) Refrential Integrity
(b) Entity Integrity
(c) Critical Integrity
(d) Data Integrity
Functional depenency in a relation between two or more non key attributes is called ___________.
(a) Synonym Dependency
(b) Transitive Dependency
(c) Query Dependency
(d) Exclusive Dependency
A ____________ can be defined as a non key attribute must not depend on any other
non key attribute.
(a) Consistent Normal Form
(b) Third Normal Form
(c) Normal Data Form
(d) Data Correctness
Process of analyzing the dependencies of attributes within entities is ____________.
(a) Integrity
(b) Normalization
(c) Protection
(d) Fact
____________ anomaly can be caused if a new record is added in a relation.
(a) Dependency
(b) Insertion
(c) Protection
(d) Homonym
Data integrity important constraint in the relational database is ____________.
(a) Normalization
(b) Transitive dependency
(c) Entity Integrity
(d) Data Correctness
Redundancy in table can create certain _____________ when the table is updated.
(a) Synonym
(b) Dependency
(c) Processes
(d) Anomalies
When all the non key attributes are fully dependent on primary key then the state is
known as ____________.
(a) Functional Dependency
(b) Entity Integrity
(c) Second Normal Form
(d) Normal Data Form
In the first normal form ____________ groups are removed.
(a) Repeating
(b) Network Data Structure
(c) Normal Data Form
(d) Data Security
Insertion, deletion & modification anomaly arises as a result of ____________.
(a) Financial Dependency
(b) Synonym Dependency
(c) Transitive Dependency
(d) Critical Dependency
When we add a new record in a relation it may cause ____________ anomaly.
(a) critical
(b) Transitive
(c) Insertion
(d) Security
The process based on the analysis of functional dependence is called ____________.
(a) Operation
(b) Dependency
(c) Normalization
(d) Anomaly
____________ should refer to the primary key in another table or it must be null.
(a) Database Protection
(b) Refrential Integrity
(c) Entity Integrity
(d) Normalization
____________ refers to the correctness and consistency of data.
(a) Data Security
(b) Simple Data structure
(c) Database Integrity
(d) Data Consistency
The attributes in two different tables having the same name are called ____________.
(a) Mutually Dependant
(b) Mutually Protected
(c) Expressions
(d) Homonym
Redundancy in table can create certain _________ in the partial functional depedency.
(a) Processes
(b) Exclusively
(c) Anomalies
(d) Conditions
Page 2 of 4

37:

38:
39:
40:
41:
42:
43:

44:
45:
46:

47:
48:
49:
50:
51:
52:

53:

When one or more non key attributes are dependant on part of the primary key a
____________ dependency exists.
(a) Homonymaly Functional
(b) Functional View
(c) Integrity Functional
(d) Partial Functional
How many normal forms exists?
(a) Seventeen
(b) Fourteen
(c) Three
(d) Sixteen
The two important constraints in relational databases are part of ____________ .
(a) Complex Data structure
(b) Data Correctness
(c) Data Integrity
(d) Normalization
For a relation to be in second normal form a relation must be in ____________ .
(a) Additional Normal Form
(b) Data Consistency
(c) First Normal Form
(d) Transitive dependency
____________ is the process based on the analysis of functional dependence.
(a) Field
(b) Normalization
(c) Query
(d) Security
Complex data structures can be converted to _____________ in normalization process.
(a) Stable Data Structures
(b) Redundant Data Structure
(c) Entity Data Structure
(d) Mobile Data Structure
____________ is a state of a relation that can be determined by applying simple rules to
that relation.
(a) Stabality
(b) Data Consistency
(c) Normal Form
(d) Data Integrity
____________ in relational database is also called a table.
(a) Correctness
(b) Exclusive
(c) Relation
(d) Security
______ is the process of converting complex data structures into simple data structures.
(a) Protection
(b) Security
(c) Correctness
(d) Normalization
____________ can be defined as the non key attributes which are fully dependent on the
primary key.
(a) Data Consistency
(b) Database Protection
(c) Second Normal Form
(d) Transitive dependency
Correctness and consistency of data is referd by ____________ .
(a) Data Operation
(b) Database Integrity
(c) Transitive dependency
(d) Complex Data structure
____________ are created when two different names are used for the same information.
(a) Data Srtategy
(b) Data Security
(c) Synonyms
(d) Mutually Protected
Field redundancy in designin database tables can be avoided in ____________.
(a) Operation
(b) Simple Data structure
(c) Normalization
(d) Homonym
____________ is an important relational database data integrity constraint.
(a) Data Correctness
(b) Referential Integrity
(c) Normalization
(d) Functional Dependency
____________ are erased at the end of second normal form.
(a) Integrity
(b) Security
(c) Posibilities
(d) Anomalies
Which of the following states that a non key attribute must not depend on any other
non key attribute?
(a) Database Protection
(b) Third Normal Form
(c) Referential Integrity
(d) Fourth Normal Form
Important constraints of ____________exists in relational databases.
(a) Homonym
(b) Redundant Information
(c) Data Integrity
(d) Functional Dependency

Page 3 of 4

54:
55:
56:

57:
58:

59:
60:
61:
62:

____________ is the process of analyzing the dependencies of attributes within entities.


(a) Normalization
(b) Anomaly
(c) Protection
(d) End User
A relation R can be in ____________ if all underlying domains contains atomic values.
(a) Fourth Normal Form
(b) Functional Dependency
(c) First Normal Form
(d) Data Operation
____________ is a process by which we can convert the complex data structures into
stable data structures.
(a) Fact
(b) Dependency
(c) Integrity
(d) Normalization
In the third normal form ____________ dependency is removed.
(a) Non Functional
(b) Functional
(c) Consistency
(d) Transitive
Relation that can be determined by applying simple rules regarding dependencies in
that relation is called ____________.
(a) Stabality
(b) Data Operation
(c) Normal Form
(d) Homonym
There are ____________ types of normalizing.
(a) Ten
(b) Twelve
(c) Thrteen
(d) Three
No primary key value should be null is a ____________ constraint.
(a) Homonym
(b) Normalization
(c) Entity Integrity
(d) Simple Data structure
In third normal form ____________ dependency is removed.
(a) Operation
(b) Homonym
(c) Critical
(d) Transitive
The ____________ must refer to the primary key in another table or it must be null.
(a) Simple Data structure
(b) Stable Data structure
(c) Complex Data structure
(d) Refrential Integrity

Page 4 of 4

Das könnte Ihnen auch gefallen