In: Computer Science
In data normalization, the removal of partial dependencies is associated with the transition from ________.
Select one:
a. Poorly structured data to first normal form (1NF)
b. First normal form (1NF) to second normal form (2NF)
c. Second normal form (2NF) to third normal form (3NF)
d. Third normal form (3NF) to Boyce-Codd normal form (BCNF)
Although the idea of a foreign key is useful for conceptual data modeling purposes, it is not actually possible to implement a foreign key in a real-world DBMS.
Select one:
a. True
b. False
Compared to the non-normalized design from which it was derived, a normalized database design will typically contain ________ inter-table relationships.
Select one:
a. More
b. Fewer
c. An equal number of
d. Zero
All of the following anomalies EXCEPT ________ can arise when using a list to store data.
Select one:
a. Deletion problems
b. Update problems
c. Query problems
d. Insertion problems
A referential integrity constraint can be used to verify that the values of a column in one table are valid in light of the values of a column in another table
Select one:
a. True
b. False
In data normalization, the removal of partial dependencies is
associated with the transition from ________.
b. First normal form (1NF) to second normal form
(2NF)
A relation is in 2NF if it has No Partial Dependencies
Although the idea of a foreign key is useful for conceptual data
modeling purposes, it is not actually possible to implement a
foreign key in a real-world DBMS.
b. False
The reason is that foreign keys restrains actions that would
destroy links between one or more tables and hence helps validate
data in the particular column.
Compared to the non-normalized design from which it was derived, a
normalized database design will typically contain ________
inter-table relationships.
a) more
The reason is that starting from 3NF, the transitive dependencies
are removed and hence, a table is divided into more tables and
hence increasing the inter-table relationships.
All of the following anomalies EXCEPT ________ can arise when
using a list to store data.
c. Query problems
A referential integrity constraint can be used to verify that
the values of a column in one table are valid in light of the
values of a column in another table
a. True
The reason is that referential integrity constraint asserts a
relationship and hence values should match from one column in the
table to another.