Test of database security P10
- Question 1. The process of data normalization is the process:
- Separation of the limited relation scheme minimizes information loss
- Perform data search operations
- Convert information representation in different forms
- Separating the relational schema does not cause loss of information
-
- Sentence 2. Basis for standardization based on concepts:
- Closed function dependencies
- Function dependent
- Attributes, closes properties
- Key and super key
-
- Question 3. A database model is considered a good standardization model, if:
- Does not appear information anomalies.
- Ensure data independence.
- Each of the properties does not lock the function dependency on the key.
- Each attribute is represented in a single form.
-
- Question 4. The relation R is called the normal form 1NF, when and only if:
- An attribute has many different values
- Properties only contain element values
- A relationship has many rows
- A relationship has multiple columns
-
- Question 5. The 1NF relationship is not acceptable during the search process, because:
- Data integrity is not guaranteed
- When manipulating archives, information anomalies often appear
- Complex data representation structure
- There are too many functional dependencies in it
-
- Question 6. The relation R is called the normal form 2NF, when and only if:
- 1NF and non-key attributes are fully dependent on the key.
- 1NF and non-key attributes are not fully dependent on the key.
- Exist XY F + so that X is a subset of the key and Y is a non-key attribute.
- 1NF and non-key attributes that fully depend on the key exist.
-
- Question 7. The 2NF relationship is not acceptable during the search process, because:
- Unable to perform updates
- The dependency closure is too large
- May not be able to insert additional information
- Data integrity is not guaranteed.
-
- Question 8. Is it possible to insert information about a cable that has not been installed?
- Impossible because of information anomalies
- Could not be because the key value is unknown
- Not possible because of information conflicts
- Can insert
-
- Question 9. In standard form 3NF:
- There are no non-key attributes depending on the key
- There are no fully dependable non-key attributes on the lock and bridging scheme
- There are no key attributes depending on the key and the bridging scheme
- There are non-key attributes that depend on the key
-
- Question 10. The 3NF relationship is acceptable during the search process, because:
- Perform updates
- Ensure data integrity
- The dependency closure is too large
- Do not appear information anomalies when performing storage operations
-
4 ★ | 1 Vote
You should read it
May be interested
- [QUIZ] Test your understanding of SQL - Part 6in order to serve your work and your study, along with sql lessons, quantrimang offers a variety of useful questions.
- Test of database security P9please read your knowledge and multiple choice questions about the database that the network administrator has edited below. certainly with this useful knowledge will help you work more effectively.
- [QUIZ] Test your understanding of SQL - Part 5multiple-choice questions on sql help you familiarize and review useful knowledge for work and learning sql language.
- Test on database security P7please read your knowledge of the database through the multiple choice questions below. hope with these interesting questions will give you lots of useful information.
- Test about database security P13please read your knowledge of the database through the multiple choice questions below. hope with these interesting questions will give you lots of useful information.
- A serious vulnerability on phpMyAdmin allows an attacker to destroy the databasea serious security vulnerability on phpmyadmin - one of the most popular mysql database management software will harm the database when the tricked administrator clicks on the link.
- Database security (common usage guidelines)recently, the database security issue has spread widely on the mass media and internet news network. the first is the slammer worm and most recently the illegal access to more than 8 million credit card numbers. many people put
- [QUIZ] Test your understanding of SQL - Part 7part 7 of the sql quiz goes into the sql practice exercises that follow the previous period.
- Test about database security P5in the quiz below, join the network administrator to find out more about this topic through extremely interesting multiple choice questions.
- Test on database security P4today network administrator will give you reading multiple choice questions around the topic of databases, with certain questions below you will have more useful knowledge.