T4Tutorials .PK

NSCT – Database Design & Normalization MCQs

1. . Database normalization is:

(A) Compressing database tables


(B) A process to organize data to reduce redundancy and improve integrity


(C) Encrypting tables


(D) Deleting old records




2. . First Normal Form (1NF) requires that:

(A) Tables must have primary keys


(B) All attributes contain atomic (indivisible) values


(C) All attributes must be unique


(D) Tables must be compressed




3. . Second Normal Form (2NF) requires that:

(A) Table is in 1NF only


(B) Table is in 1NF and all non-key attributes are fully functionally dependent on the primary key


(C) Table is in 3NF


(D) Table is encrypted




4. . Third Normal Form (3NF) requires that:

(A) Table is in 1NF only


(B) Table is in 2NF and no transitive dependency exists


(C) Table is in 2NF and compressed


(D) Table is encrypted




5. . BCNF (Boyce-Codd Normal Form) requires that:

(A) Table is in 1NF only


(B) Every determinant is a candidate key


(C) Table is encrypted


(D) Table is compressed




6. . Denormalization is:

(A) Compressing tables


(B) Normalizing tables


(C) Encrypting tables


(D) Process of combining tables to improve performance at the cost of redundancy




7. . Functional dependency occurs when:

(A) Tables are compressed


(B) Attributes are encrypted


(C) The value of one attribute determines the value of another attribute


(D) Data is deleted




8. . A candidate key is:

(A) An attribute or set of attributes that can uniquely identify a tuple


(B) A foreign key


(C) An encrypted key


(D) A compressed attribute




9. . Primary key is:

(A) Foreign key only


(B) A candidate key selected to uniquely identify tuples


(C) Encrypted key


(D) Compressed attribute




10. . Foreign key is used to:

(A) Maintain referential integrity between tables


(B) Encrypt data


(C) Compress data


(D) Delete old records




11. . A transitive dependency occurs when:

(A) Attributes are encrypted


(B) A primary key depends on foreign key


(C) Tables are compressed


(D) A non-key attribute depends on another non-key attribute




12. . Multivalued dependency occurs when:

(A) Table is compressed


(B) Table is encrypted


(C) One attribute in a table uniquely determines multiple values of another attribute


(D) Table is deleted




13. . Fourth Normal Form (4NF) requires that:

(A) Table is encrypted


(B) Table is in 3NF only


(C) Table is compressed


(D) Table is in BCNF and no multivalued dependencies exist




14. . Fifth Normal Form (5NF) requires that:

(A) Table is compressed


(B) Table is in 3NF only


(C) Table is in 4NF and cannot be further decomposed without losing data


(D) Table is encrypted




15. . Advantages of normalization include:

(A) Automatic encryption


(B) Faster compression


(C) Reduced redundancy, improved integrity, easier maintenance


(D) Deleted old records




16. . Disadvantages of normalization include:

(A) Tables are automatically deleted


(B) Reduced data integrity


(C) More complex queries and possible performance overhead


(D) Tables are compressed




17. . Anomalies prevented by normalization include:

(A) Insertion, update, and deletion anomalies


(B) Compression anomalies


(C) Encryption anomalies


(D) CPU anomalies




18. . Surrogate key is:

(A) Foreign key only


(B) Artificial key created for unique identification of tuples


(C) Primary key only


(D) Compressed attribute




19. . Natural key is:

(A) A compressed key


(B) A key based on real-world attributes


(C) Encrypted key


(D) Artificial key




20. . The main goal of Database Design & Normalization is:

(A) Delete old data automatically


(B) Compress tables


(C) Encrypt tables


(D) Organize data efficiently, reduce redundancy, ensure integrity, and prevent anomalies




Exit mobile version