Filters
Question type

Study Flashcards

The most likely data type for a surrogate key is ____.


A) Character
B) Date
C) Logical
D) Numeric

E) All of the above
F) None of the above

Correct Answer

verifed

verified

In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes might ultimately require the use of ____________________ keys.

Correct Answer

verifed

verified

In a(n) ____ diagram, the arrows above the attributes indicate all desirable dependencies.


A) Chen
B) dependency
C) functionality
D) ER

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Dependencies based on only a part of a composite primary key are called ____ dependencies.


A) primary
B) partial
C) incomplete
D) composite

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

The advantage of higher processing speed must be carefully weighed against the disadvantage of data anomalies.

A) True
B) False

Correct Answer

verifed

verified

True

A determinant is any attribute whose value determines other values within a column.

A) True
B) False

Correct Answer

verifed

verified

Data redundancy produces ____.


A) slower lookups
B) robust design
C) efficient storage use
D) data integrity problems

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Normalization represents a micro view of the ____ within the ERD.


A) entities
B) attributes
C) relationships
D) forms

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

The conflicts between design efficiency, information requirements, and processing speed are often resolved through ____.


A) conversion from 1NF to 2NF
B) conversion from 2NF to 3NF
C) compromises that include denormalization
D) conversion from 3NF to 4NF

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

It is possible for a table in 2NF to exhibit transitive dependency, where the primary key may rely on one or more nonprime attributes to functionally determine other nonprime attributes.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ derives its name from the fact that a group of multiple entries of the same type can exist for any single key attribute occurrence.

Correct Answer

verifed

verified

BCNF can be violated only if the table contains more than one ____ key.


A) primary
B) candidate
C) foreign
D) secondary

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

B

Normalization produces a lower normal form.

A) True
B) False

Correct Answer

verifed

verified

Dependencies that are based on only a part of a composite primary key are called transitive dependencies.

A) True
B) False

Correct Answer

verifed

verified

False

A table is in BCNF if every determinant in the table is a candidate key.

A) True
B) False

Correct Answer

verifed

verified

A table is in BCNF if every determinant in the table is a foreign key.

A) True
B) False

Correct Answer

verifed

verified

Before converting a table into 3NF, it is imperative the table already be in ____.


A) 1NF
B) 2NF
C) 4NF
D) BCNF

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Dependencies can be identified with the help of a dependency ____________________.

Correct Answer

verifed

verified

A(n) ____ exists when there are functional dependencies such that Y is functionally dependent on X and Z is functionally dependent on Y, and X is the primary key.


A) partial dependency
B) repeating group
C) atomic attribute
D) transitive dependency

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Some very specialized applications may require normalization beyond the ____.


A) 1NF
B) 2NF
C) 3NF
D) 4NF

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 1 - 20 of 100

Related Exams

Show Answer