12th Class Class Computer Mcqs Chapter No 4 | 2nd Year Computer Mcqs Chapter Wise Pdf

Chapter No 4

Data Integrity & Normalization

1. In 3NF, which form of dependency is removed choose which one is correct? 

  1. Functional
  2. non-functional 
  3. associative
  4. transitive 

2. How many types of data integrity are there choose which one is correct?

  1. 2
  2. 4

3. The ________ constraint states that in a relation no primary key value can have a  null value. 

  1. Referential integrity
  2. Entity integrity
  3. Data integrity
  4. All of these

4. In 3NF, a non-key attribute must not depend on a(n) 

  1. non-key attribute
  2. key attribute 
  3. composite key
  4. sort key 

5. Different attributes in two different tables having same name are referred to as

  1. synonym
  2. Homonym
  3. acronym
  4. mutually exclusive

6. Referential integrity is applied on 

  1. Primary Key
  2. Candidate Key
  3. Foreign key
  4. Composite key 

7.            problems occurs when two different names are used for the same  information choose which one is correct? 

  1. Homonyms
  2. Synonyms 
  3. Redundant information
  4. Mutually exclusive data

8.          problems occurs when same name is used for two different attributes choose which one is correct:

  1. Homonyms
  2. Synonyms 
  3. Redundant information
  4. Mutually Exclusive data 

9.                problems occurs when same information is stored in two different ways choose which one is correct:

  1. Homonyms
  2. Synonyms 
  3. Redundant Information
  4. Mutually Exclusive data 

10. The process of converting complex data structure into simple and stable data  structure is called choose which one is correct:

  1. Synonyms
  2. Homonym 
  3. Normalization
  4. Redundancy 

11. A functional dependency between two or more non-key attributes in a relation is  called 

  1. Redundancy
  2. Consistency 
  3. Transitive Dependency
  4. None of above 

12. Data integrity is another form of data 

  1. Data Feasibility
  2. Data Accessibility
  3. Data modeling
  4. Data Protection

13. Integrity is concerned with the _________ of Data 

  1. Reliability
  2. Quality
  3. Feasibility
  4. Accessibility 

14. A foreign key constraint is also called 

  1. Referential Integrity
  2. Integrity 
  3. Entity Integrity
  4. Field Integrity

15. In which of the following normal forms, any repeating group from the table is  removed choose which one is correct? 

  1. 1NF
  2. 2NF
  3. 3NF
  4. None 

16. A relation is in second normal form if and only if choose which one is correct: 

  1. It is in 1NF and all the non-key attributes are fully functionally  dependent upon the key attribute.
  2. It is in the 1NF and no transitive dependency exists 
  3. It is in the 1NF and every attribute is single valued for each tuple. 
  4. All of these

17. If a relation is in 1NF and the key consists of a single attributes then the relation is  called.

  1. 3NF
  2. 2NF
  3. Both (a) & (b)
  4. None 

18. If the value of a non-key attribute can be obtained simply by knowing the values  oF another non-key attribute, the relation is not in choose which one is correct:

  1. 1NF
  2. 2NF
  3. 3NF
  4. None 

19. A process in which it is being ensured that attributes are stored from where they belong 

  1. Normalization
  2. Simplification
  3. Structure Constraint
  4. Field Constraints 

20. A process of analyzing the dependencies of attributes with in entities is called

  1. Normalization
  2. Simplification
  3. Structure Constraint
  4. Field Constraints

21. The attribute on left hand side of arrow is called 

  1. Entity
  2. Determinant
  3. Determined
  4. Attribute

22. Which form of dependency is removed for 2NF choose which one is correct? 

  1. Functional
  2. Transitive 
  3. Associative
  4. Partial 

23.          anomalies arise due to transitive dependency choose which one is correct:

  1. Insertion
  2. Deletion
  3. Modification
  4. All of these

24. The objective of normalization is to choose which one is correct:

  1.  Increase data redundancy
  2. Increase number of relations
  3. Get stable data structure
  4. All of these