In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as: (A) Referential integrity (B) Multi-valued dependency (C) Entity Integrity (D) Functional dependency

1 Answer

Answer :

(C) Entity Integrity

Related questions

Description : . ………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations. A) Entity Integrity Constraints B) Referential Integrity Constraints

Last Answer : B) Referential Integrity

Description : Which if the following is not the type of data integrity. A) Key integrity B) Domain integrity C) Entity integrity D) Referential integrity

Last Answer : A) Key integrity

Description : The student marks should not be greater than 100. This is (A) Integrity constraint (B) Referential constraint (C) Over-defined constraint (D) Feasible constraint

Last Answer : (A) Integrity constraint

Description : What are the Referential actions supported by FOREIGN KEY integrity constraint ?

Last Answer : UPDATE and DELETE Restrict - A referential integrity rule that disallows the update or deletion of referenced data. DELETE Cascade - When a referenced row is deleted all associated dependent rows are deleted.

Description : What are the Referential actions supported by FOREIGN KEY integrity constraint?

Last Answer : UPDATE and DELETE Restrict – A referential integrity rule that disallows the update or deletion of referenced data. DELETE Cascade – When a referenced row is deleted all associated dependent rows are deleted.

Description : Can Check constraint be used for self referential integrity ? How ?

Last Answer : ? Yes. In the CHECK condition for a column of a table, we can reference some other column of the same table and thus enforce self referential integrity.

Description : In a relational database model, NULL values can be used for all but which one of the following? (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL. (B) To ... D) To fill a column in a tuple when that column does not really exist for that particular tuple.

Last Answer : (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL.

Description : The RDBMS terminology for a row is (A) tuple. (B) relation. (C) attribute. (D) degree.

Last Answer : (A) tuple

Description : Which of the following provides the best description of an entity type? (A) A specific concrete object with a defined set of processes (e.g. Jatin with diabetes) (B) A value given to a ... template for a group of things with the same set of characteristics that may exist in the real world

Last Answer : Answer: D

Description : For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation (A) In 1NF not in 2NF (B) In 2NF not in 3NF (C) In 3NF (D) In 1NF

Last Answer : (A) In 1NF not in 2NF 

Description : Consider a schema R(MNPQ) and functional dependencies M→N, P→Q. Then the decomposition of R into R1(MN) and R2(PQ) is ............. (1) Dependency preserving but not lossless ... and lossless join (3) Lossless join but not dependency preserving (4) Neither dependency preserving nor lossless join. 

Last Answer : Answer: 1

Description : Which one is correct w.r.t. RDBMS? (1) primary key ⊆ super key ⊆ candidate key (2) primary key ⊆ candidate key ⊆ super key (3) super key ⊆ candidate key ⊆ primary key (4) super key ⊆ primary key ⊆ candidate key

Last Answer : Answer: 2

Description : An ER Model includes I. An ER diagram portraying entity types. II. Attributes for each entity type III. Relationships among entity types. IV. Semantic integrity constraints that reflects the business rules about data not ... ; IV (B) I&IV (C) I, II & IV (D) I & III

Last Answer : (A) I, II, III & IV

Description : A ………………. Does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity. A) Weak entity B) Strong entity C) Non attributes entity D) Dependent entity

Last Answer : A) Weak entity

Description : In an ER model, ……………. is described in the database by storing its data. A) Entity B) Attribute C) Relationship D) Notation

Last Answer : A) Entity

Description : For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as : (A) Neighbour Set (B) Strong Entity Set (C) Owner entity set (D) Weak Set

Last Answer : (C) Owner entity set 

Description : Drop Table cannot be used to drop a table referenced by a …………… constraint. A) Local Key B) Primary Key C) Composite Key D) Foreign Key

Last Answer : D) Foreign Key

Description : Drop Table cannot be used to drop a Table referenced by .................. constraint. (a) Primary key (b) Sub key (c) Super key (d) Foreign key (A) (a) (B) (a), (b) and (c) (C) (d) (D) (a) and (d)

Last Answer : (C) (d)

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : Give two examples of referential integrity constraints.

Last Answer : rential integrity constraints.

Description : Describe Referential Integrity ?

Last Answer : A rule defined on a column (or set of columns) in one table that allows the insert or update of a row only if the value for the column or set of columns (the dependent value) matches a value ... data and the action to be performed on dependent data as a result of any action on referenced data.

Description : What is Referential Integrity ?

Last Answer : Maintaining data integrity through a set of rules that restrict the values of one or more columns of the tables based on the values of primary key or unique key of the referenced table.

Description : How can you Enforce Referential Integrity in snapshots ?

Last Answer : Time the references to occur when master tables are not in use. Peform the reference the manually immdiately locking the master tables. We can join tables in snopshots by creating a complex snapshots that will based on the master tables.

Description : • Describe Referential Integrity?

Last Answer : A rule defined on a column (or set of columns) in one table that allows the insert or update of a row only if the value for the column or set of columns (the dependent value) matches a ... data and the action to be performed on dependent data as a result of any action on referenced data.

Description : Based on the cardinality ratio and participation ............... associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. (A) Entity (B) Constraints (C) Rules (D) Keys

Last Answer : (B) Constraints

Description : If an unique key constraint on DATE column is created, will it validate the rows that are inserted with SYSDATE ?

Last Answer : It won't, Because SYSDATE format contains time attached with it.

Description : In RDBMS, Data is presented as a collection of ............ A) Table B) Attributes C) Relations D) Entities

Last Answer : C) Relations

Description : If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called ................ is needed. A) DKNF B) BCNF C) Fourth D) Third

Last Answer : B) BCNF

Description : A .................. normal form normalization will be needed where all attributes in a relation tuple are not functionally dependent only on the key attribute. A) First B) Second C) Third D) Fourth

Last Answer : C) Third

Description : ………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs. A) Instance B) Schema c) Program D) Super Key

Last Answer : B) Schema

Description : The Relation Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because : (A) Non key attribute V_name is dependent on V_no which is part of composite key (B) ... Qty_sup is dependent on primary_key unit price (D) key attribute V_ord_no is dependent on primary_key unit price

Last Answer : (A) Non key attribute V_name is dependent on V_no which is part of composite key

Description : Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? (A) Semantic network (B) Frames (C) Scripts (D) Conceptual Dependency

Last Answer : (C) Scripts 

Description : A relation R={A,B,C,D,E,F,G} is given with following set of functional dependencies: F={AD→E, BE→F, B→C, AF→G} Which of the following is a candidate key? (A) A (B) AB (C) ABC (D) ABD

Last Answer : Answer: D

Description : A data flow can A) Only emanate from an external entity B) Only terminate in an external entity C) May emanate and terminate in an external entity D) May either emanate or terminate in an external entity but not both

Last Answer : C) May emanate and terminate in an external entity

Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.

Last Answer : C) It should avoid/reduce the redundancy.

Description : What is an Integrity Constraint ?

Last Answer : Integrity constraint is a rule that restricts values to a column in a table.

Description : A B C is a set of attributes. The functional dependency is as follows AB -> B AC -> C C -> B a) is in 1NF b) is in 2NF c) is in 3NF d) is in BCNF

Last Answer : a) is in 1NF

Description : What is Fully Functional dependency?

Last Answer : It is based on concept of full functional dependency. A functional dependency X Y is full functional dependency if removal of any attribute A from X means that the dependency does not hold any more.

Description : When is a functional dependency F said to be minimal?

Last Answer : ∙ Every dependency in F has a single attribute for its right hand side. ∙ We cannot replace any dependency X A in F with a dependency Y A where Y is a proper subset of X and still have a set ... F. ∙ We cannot remove any dependency from F and still have set of dependency that is equivalent to F.

Description : What is Functional Dependency?

Last Answer : A Functional dependency is denoted by X Y between two sets of attributes X and Y that are subsets of R specifies a constraint on the possible tuple that can form a relation state r of R. The ... [Y]. This means the value of X component of a tuple uniquely determines the value of component Y.

Description : Explain functional dependency with example.

Last Answer : A functional dependency occurs when one attribute in a relation uniquely determines another attribute. OR Consider a relation say R(X,Y), where X and Y are one or more than one attribute, ... sscper. That is, given rollno of a student, the name and sscper can be determined or searched.

Description : Which of the following auditor concerns most likely could be so serious that the auditor concludes that a financial statement audit cannot be conducted? a. The entity has no formal written ... subject to management override d. Management fails to modify prescribed controls for changes in conditions

Last Answer : The integrity of the entity’s management is suspect

Description : Let E1 and E2 be two entities in E-R diagram with simple single valued attributes. R1 and R2 are two relationships between E1 and E2 where R1 is one-many and R2 is many-many. R1 and R2 do not have any ... are required to represent this situation in the Relational Model? (A) 4 (B) 3 (C) 2 (D) 1

Last Answer : (B) 3 

Description : Pointer holds A) Value of variable B) Address of variable C) Value and address of variable D) Always null

Last Answer : B) Address of variable

Description : The property of binary tree is A) The first subset is called left subtree B) The second subtree is called right subtree C) The root cannot contain NULL D) The right subtree can be empty

Last Answer : D) The right subtree can be empty

Description : The ..................... is essentially used to search for patterns in target string. A) Like Predicate B) Null Predicate C) In Predicate D) Out Predicate

Last Answer : A) Like Predicate