Test of database security P10
- Question 1. The process of data normalization is the process:
- Separation of the limited relation scheme minimizes information loss
- Perform data search operations
- Convert information representation in different forms
- Separating the relational schema does not cause loss of information
-
- Sentence 2. Basis for standardization based on concepts:
- Closed function dependencies
- Function dependent
- Attributes, closes properties
- Key and super key
-
- Question 3. A database model is considered a good standardization model, if:
- Does not appear information anomalies.
- Ensure data independence.
- Each of the properties does not lock the function dependency on the key.
- Each attribute is represented in a single form.
-
- Question 4. The relation R is called the normal form 1NF, when and only if:
- An attribute has many different values
- Properties only contain element values
- A relationship has many rows
- A relationship has multiple columns
-
- Question 5. The 1NF relationship is not acceptable during the search process, because:
- Data integrity is not guaranteed
- When manipulating archives, information anomalies often appear
- Complex data representation structure
- There are too many functional dependencies in it
-
- Question 6. The relation R is called the normal form 2NF, when and only if:
- 1NF and non-key attributes are fully dependent on the key.
- 1NF and non-key attributes are not fully dependent on the key.
- Exist XY F + so that X is a subset of the key and Y is a non-key attribute.
- 1NF and non-key attributes that fully depend on the key exist.
-
- Question 7. The 2NF relationship is not acceptable during the search process, because:
- Unable to perform updates
- The dependency closure is too large
- May not be able to insert additional information
- Data integrity is not guaranteed.
-
- Question 8. Is it possible to insert information about a cable that has not been installed?
- Impossible because of information anomalies
- Could not be because the key value is unknown
- Not possible because of information conflicts
- Can insert
-
- Question 9. In standard form 3NF:
- There are no non-key attributes depending on the key
- There are no fully dependable non-key attributes on the lock and bridging scheme
- There are no key attributes depending on the key and the bridging scheme
- There are non-key attributes that depend on the key
-
- Question 10. The 3NF relationship is acceptable during the search process, because:
- Perform updates
- Ensure data integrity
- The dependency closure is too large
- Do not appear information anomalies when performing storage operations
-
4 ★ | 1 Vote
You should read it
May be interested
- Multiple choice questions on network security deployment have the answer P4please read our knowledge and interesting multiple choice questions about our network security deployment below. the question set will have 10 sentences to try.
- What do you know about P18 software technologyplease read the test questions on software technology that network administrator has compiled and edited below. hope with these questions will give you more useful knowledge.
- What test you know about operating system P6the operating system is an important and necessary software for any mobile device or laptop. to help readers find out more about this topic, the quiz below network administrators have compiled and sent you.
- The Linux Network Administration test has the answer P6in order to help readers strengthen their knowledge of linux operating system, in the test below, network administrator will send you to read the multiple choice questions very interesting for you to try.
- Test of database security P9please read your knowledge and multiple choice questions about the database that the network administrator has edited below. certainly with this useful knowledge will help you work more effectively.
- The Microsoft Access test has the answer P6if you are a beginner using access software, then the quiz below will give you lots of useful information for the process.