NSCT – Database Design & Normalization MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Database normalization is: (A) Compressing database tables (B) A process to organize data to reduce redundancy and improve integrity (C) Encrypting tables (D) Deleting old recordsShow All Answers 2. . First Normal Form (1NF) requires that: (A) Tables must have primary keys (B) All attributes contain atomic (indivisible) values (C) All attributes must be unique (D) Tables must be compressed 3. . Second Normal Form (2NF) requires that: (A) Table is in 1NF only (B) Table is in 1NF and all non-key attributes are fully functionally dependent on the primary key (C) Table is in 3NF (D) Table is encrypted 4. . Third Normal Form (3NF) requires that: (A) Table is in 1NF only (B) Table is in 2NF and no transitive dependency exists (C) Table is in 2NF and compressed (D) Table is encrypted 5. . BCNF (Boyce-Codd Normal Form) requires that: (A) Table is in 1NF only (B) Every determinant is a candidate key (C) Table is encrypted (D) Table is compressed 6. . Denormalization is: (A) Compressing tables (B) Normalizing tables (C) Encrypting tables (D) Process of combining tables to improve performance at the cost of redundancy 7. . Functional dependency occurs when: (A) Tables are compressed (B) Attributes are encrypted (C) The value of one attribute determines the value of another attribute (D) Data is deleted 8. . A candidate key is: (A) An attribute or set of attributes that can uniquely identify a tuple (B) A foreign key (C) An encrypted key (D) A compressed attribute 9. . Primary key is: (A) Foreign key only (B) A candidate key selected to uniquely identify tuples (C) Encrypted key (D) Compressed attribute 10. . Foreign key is used to: (A) Maintain referential integrity between tables (B) Encrypt data (C) Compress data (D) Delete old records 11. . A transitive dependency occurs when: (A) Attributes are encrypted (B) A primary key depends on foreign key (C) Tables are compressed (D) A non-key attribute depends on another non-key attribute 12. . Multivalued dependency occurs when: (A) Table is compressed (B) Table is encrypted (C) One attribute in a table uniquely determines multiple values of another attribute (D) Table is deleted 13. . Fourth Normal Form (4NF) requires that: (A) Table is encrypted (B) Table is in 3NF only (C) Table is compressed (D) Table is in BCNF and no multivalued dependencies exist 14. . Fifth Normal Form (5NF) requires that: (A) Table is compressed (B) Table is in 3NF only (C) Table is in 4NF and cannot be further decomposed without losing data (D) Table is encrypted 15. . Advantages of normalization include: (A) Automatic encryption (B) Faster compression (C) Reduced redundancy, improved integrity, easier maintenance (D) Deleted old records 16. . Disadvantages of normalization include: (A) Tables are automatically deleted (B) Reduced data integrity (C) More complex queries and possible performance overhead (D) Tables are compressed 17. . Anomalies prevented by normalization include: (A) Insertion, update, and deletion anomalies (B) Compression anomalies (C) Encryption anomalies (D) CPU anomalies 18. . Surrogate key is: (A) Foreign key only (B) Artificial key created for unique identification of tuples (C) Primary key only (D) Compressed attribute 19. . Natural key is: (A) A compressed key (B) A key based on real-world attributes (C) Encrypted key (D) Artificial key 20. . The main goal of Database Design & Normalization is: (A) Delete old data automatically (B) Compress tables (C) Encrypt tables (D) Organize data efficiently, reduce redundancy, ensure integrity, and prevent anomalies