Test of database security P10
Database is a data collection organized in a structured way related to each other and stored in a computer. The database is designed and built to allow users to store data, retrieve information or update data. Here, please read more about this topic through our quiz below.
- Question 1. The process of data normalization is the process:
- Separation of the limited relation scheme minimizes information loss
- Perform data search operations
- Convert information representation in different forms
- Separating the relational schema does not cause loss of information
-
- Sentence 2. Basis for standardization based on concepts:
- Closed function dependencies
- Function dependent
- Attributes, closes properties
- Key and super key
-
- Question 3. A database model is considered a good standardization model, if:
- Does not appear information anomalies.
- Ensure data independence.
- Each of the properties does not lock the function dependency on the key.
- Each attribute is represented in a single form.
-
- Question 4. The relation R is called the normal form 1NF, when and only if:
- An attribute has many different values
- Properties only contain element values
- A relationship has many rows
- A relationship has multiple columns
-
- Question 5. The 1NF relationship is not acceptable during the search process, because:
- Data integrity is not guaranteed
- When manipulating archives, information anomalies often appear
- Complex data representation structure
- There are too many functional dependencies in it
-
- Question 6. The relation R is called the normal form 2NF, when and only if:
- 1NF and non-key attributes are fully dependent on the key.
- 1NF and non-key attributes are not fully dependent on the key.
- Exist XY F + so that X is a subset of the key and Y is a non-key attribute.
- 1NF and non-key attributes that fully depend on the key exist.
-
- Question 7. The 2NF relationship is not acceptable during the search process, because:
- Unable to perform updates
- The dependency closure is too large
- May not be able to insert additional information
- Data integrity is not guaranteed.
-
- Question 8. Is it possible to insert information about a cable that has not been installed?
- Impossible because of information anomalies
- Could not be because the key value is unknown
- Not possible because of information conflicts
- Can insert
-
- Question 9. In standard form 3NF:
- There are no non-key attributes depending on the key
- There are no fully dependable non-key attributes on the lock and bridging scheme
- There are no key attributes depending on the key and the bridging scheme
- There are non-key attributes that depend on the key
-
- Question 10. The 3NF relationship is acceptable during the search process, because:
- Perform updates
- Ensure data integrity
- The dependency closure is too large
- Do not appear information anomalies when performing storage operations
-
4 ★ | 1 Vote
You should read it
- Test about database security P12
- Test about database security P11
- Test about database security P5
- Test about database security P13
- Test on database security P7
- Test of database security P9
- Test about database security P8
- Test on database security P6
- Database test - Part 2
- Microsoft Access test has the answer P1
- The Microsoft Access test has the answer P5
- The Microsoft Access test has a P3 answer
Maybe you are interested
8 settings to change to make your Mac trackpad and keyboard work like Windows
6 ways to fix arrow keys not working in Excel
Fix the error of not being able to use the F4 key in Excel with shortcut keys
9 Ways to Fix Keyboard Typing Delay on Windows 10/11
Why should you replace your iPhone's default keyboard with Gboard?
It's time to switch to Passkey: The anti-phishing password alternative!