Database Management Systems Mcqs

Page No. 28

We can use the following three rules to find logically implied functional dependencies. This collection of rules is called


aAxioms


bArmstrong’s axioms


cArmstrong


dClosure


View Answer Armstrong’s axioms

Which forms are based on the concept of functional dependency:


a1NF


b2NF


c3NF


d4NF


View Answer 3NF

Which forms simplifies and ensures that there are minimal data aggregates and repetitive groups:


a1NF


b2NF


c3NF


dAll of the mentioned


View Answer 3NF

Functional Dependencies are the types of constraints that are based on______


aKey


bKey revisited


cSuperset key


dNone of the mentioned


View Answer Key

Which-one ofthe following statements about normal forms is FALSE?


aBCNF is stricter than 3 NF


bLossless, dependency -preserving decomposition into 3 NF is always possible


cLoss less, dependency – preserving decomposition into BCNF is always possible


dAny relation with two attributes is BCNF



Tables in second normal form (2NF):


aEliminate all hidden dependencies


bEliminate the possibility of a insertion anomalies


cHave a composite key


dHave all non key fields depend on the whole primary key



A table on the many side of a one to many or many to many relationship must:


aBe in Second Normal Form (2NF)


bBe in Third Normal Form (3NF)


cHave a single attribute key


dHave a composite key


View Answer Have a composite key

In the __________ normal form, a composite attribute is converted to individual attributes.


aFirst


bSecond


cThird


dFourth


View Answer First

Which is the principle of the encryption using a key?


aThe key indicates which function is used for encryption. Thereby it is more difficult to decrypt an intercepted message as the function is unknown


bThe key contains the secret function for encryption including parameters. Only a password can activate the key


cAll functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption


dThe key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption



Which is the largest disadvantage of symmetric Encryption?


aMore complex and therefore more time-consuming calculations


bProblem of the secure transmission of the Secret Key


cLess secure encryption function


dIsn’t used any more



Goto Page No.

Page 28 of 101

Alphabetical MCQs Categories

Here below You find all kind of categories of MCQs in alphabetical order.


"Comprehensive Collection of MCQs: Alphabetically Organized by Subject"

"Discover an extensive collection of multiple-choice questions (MCQs) neatly categorized by subject from A to Z. This resource is designed for anyone eager to explore various topics in a straightforward and organized manner. Whether you're a student preparing for exams, an educator seeking supplementary materials, or simply curious about different subjects, this compilation offers a convenient way to learn and assess your knowledge. With questions arranged alphabetically, navigation is effortless, allowing you to delve into subjects of interest at your own pace. Engage, learn, and expand your understanding with this accessible and comprehensive repository of MCQs!"


BolPakistan

bolpakistan.com.pk includes Job Mcqs and Pak Mcqs is the Top Largest Mcqs Forum in World, in which you can read Mcqs of All Subjects, PPSC test preparation, FPSC, NTS and PPSC PAST PAPERS, PPSC PAST MCQS. A Collection of Repeated MCQs for JOBs seekers.

Copyright © 2024, Designed & Developed by BolPakistan