Test of database security P10

Database is a data collection organized in a structured way related to each other and stored in a computer. The database is designed and built to allow users to store data, retrieve information or update data. Here, please read more about this topic through our quiz below.
  1. Question 1. The process of data normalization is the process:
    1. Separation of the limited relation scheme minimizes information loss
    2. Perform data search operations
    3. Convert information representation in different forms
    4. Separating the relational schema does not cause loss of information
  2. Sentence 2. Basis for standardization based on concepts:
    1. Closed function dependencies
    2. Function dependent
    3. Attributes, closes properties
    4. Key and super key
  3. Question 3. A database model is considered a good standardization model, if:
    1. Does not appear information anomalies.
    2. Ensure data independence.
    3. Each of the properties does not lock the function dependency on the key.
    4. Each attribute is represented in a single form.
  4. Question 4. The relation R is called the normal form 1NF, when and only if:
    1. An attribute has many different values
    2. Properties only contain element values
    3. A relationship has many rows
    4. A relationship has multiple columns
  5. Question 5. The 1NF relationship is not acceptable during the search process, because:
    1. Data integrity is not guaranteed
    2. When manipulating archives, information anomalies often appear
    3. Complex data representation structure
    4. There are too many functional dependencies in it
  6. Question 6. The relation R is called the normal form 2NF, when and only if:
    1. 1NF and non-key attributes are fully dependent on the key.
    2. 1NF and non-key attributes are not fully dependent on the key.
    3. Exist XY F + so that X is a subset of the key and Y is a non-key attribute.
    4. 1NF and non-key attributes that fully depend on the key exist.
  7. Question 7. The 2NF relationship is not acceptable during the search process, because:
    1. Unable to perform updates
    2. The dependency closure is too large
    3. May not be able to insert additional information
    4. Data integrity is not guaranteed.
  8. Question 8. Is it possible to insert information about a cable that has not been installed?
    1. Impossible because of information anomalies
    2. Could not be because the key value is unknown
    3. Not possible because of information conflicts
    4. Can insert
  9. Question 9. In standard form 3NF:
    1. There are no non-key attributes depending on the key
    2. There are no fully dependable non-key attributes on the lock and bridging scheme
    3. There are no key attributes depending on the key and the bridging scheme
    4. There are non-key attributes that depend on the key
  10. Question 10. The 3NF relationship is acceptable during the search process, because:
    1. Perform updates
    2. Ensure data integrity
    3. The dependency closure is too large
    4. Do not appear information anomalies when performing storage operations
4 ★ | 1 Vote