1. . Database normalization is:
(A) Compressing database tables
(B) A process to organize data to reduce redundancy and improve integrity
(C) Encrypting tables
(D) Deleting old records
2. . First Normal Form (1NF) requires that:
(A) Tables must have primary keys
(B) All attributes contain atomic (indivisible) values
(C) All attributes must be unique
(D) Tables must be compressed
3. . Second Normal Form (2NF) requires that:
(A) Table is in 1NF only
(B) Table is in 1NF and all non-key attributes are fully functionally dependent on the primary key
(C) Table is in 3NF
(D) Table is encrypted
4. . Third Normal Form (3NF) requires that:
(A) Table is in 1NF only
(B) Table is in 2NF and no transitive dependency exists
(C) Table is in 2NF and compressed
(D) Table is encrypted
5. . BCNF (Boyce-Codd Normal Form) requires that:
(A) Table is in 1NF only
(B) Every determinant is a candidate key
(C) Table is encrypted
(D) Table is compressed
6. . Denormalization is:
(A) Compressing tables
(B) Normalizing tables
(C) Encrypting tables
(D) Process of combining tables to improve performance at the cost of redundancy
7. . Functional dependency occurs when:
(A) Tables are compressed
(B) Attributes are encrypted
(C) The value of one attribute determines the value of another attribute
(D) Data is deleted
8. . A candidate key is:
(A) An attribute or set of attributes that can uniquely identify a tuple
(B) A foreign key
(C) An encrypted key
(D) A compressed attribute
9. . Primary key is:
(A) Foreign key only
(B) A candidate key selected to uniquely identify tuples
(C) Encrypted key
(D) Compressed attribute
10. . Foreign key is used to:
(A) Maintain referential integrity between tables
(B) Encrypt data
(C) Compress data
(D) Delete old records
11. . A transitive dependency occurs when:
(A) Attributes are encrypted
(B) A primary key depends on foreign key
(C) Tables are compressed
(D) A non-key attribute depends on another non-key attribute
12. . Multivalued dependency occurs when:
(A) Table is compressed
(B) Table is encrypted
(C) One attribute in a table uniquely determines multiple values of another attribute
(D) Table is deleted
13. . Fourth Normal Form (4NF) requires that:
(A) Table is encrypted
(B) Table is in 3NF only
(C) Table is compressed
(D) Table is in BCNF and no multivalued dependencies exist
14. . Fifth Normal Form (5NF) requires that:
(A) Table is compressed
(B) Table is in 3NF only
(C) Table is in 4NF and cannot be further decomposed without losing data
(D) Table is encrypted
15. . Advantages of normalization include:
(A) Automatic encryption
(B) Faster compression
(C) Reduced redundancy, improved integrity, easier maintenance
(D) Deleted old records
16. . Disadvantages of normalization include:
(A) Tables are automatically deleted
(B) Reduced data integrity
(C) More complex queries and possible performance overhead
(D) Tables are compressed
17. . Anomalies prevented by normalization include:
(A) Insertion, update, and deletion anomalies
(B) Compression anomalies
(C) Encryption anomalies
(D) CPU anomalies
18. . Surrogate key is:
(A) Foreign key only
(B) Artificial key created for unique identification of tuples
(C) Primary key only
(D) Compressed attribute
19. . Natural key is:
(A) A compressed key
(B) A key based on real-world attributes
(C) Encrypted key
(D) Artificial key
20. . The main goal of Database Design & Normalization is:
(A) Delete old data automatically
(B) Compress tables
(C) Encrypt tables
(D) Organize data efficiently, reduce redundancy, ensure integrity, and prevent anomalies