1. by including integrity constraints in existing relations we use?
A. update table
B. alert table
C. delete table
D. create table
Ans:
2. Which one are not the integrity constraints?
A. identical
B. not null
C. unique
D. none of these
Ans:
3. The key is the one in which the primary of one relation is referenced to another relation is called
A. primary key
B. foreign key
C. candidate key
D. concatenate key
Ans:
4. Following is the right syntax for assertion?
A. create assertion ‘predicates’;
B. create assertion check ‘predicate’ ‘assertion name’;
C. create ‘assertion-name’ check ‘predicates’;
D.all of the above
Ans:
5. Which of the following _____is preferred method for enforcing data integrity?
A. stored procedure
B. constraints
C. cursor
D. none of these
Ans:
6. Which of the following command in SQL is used to create a table?
A. MAKE TABLE
B. DLETE TABLE
C. UPDATE TABLE
D. CREATE TABLE
Ans:
7. CREATE TABLE course
( . . .
FOREIGN KEY (dept name) REFERENCES department
. . . );
The following code is used.
A. delete
B. delete tuple
C. delete cascade
D. none of these
Ans:
8. referential integrity constrains are also called?
A. superset dependencies
B. subset dependencies
C. functional dependencies
D. all of these
Ans:
9. Is oracle sport complex check condition.
A. yes
B. does not suport
C. no
D. none of these
Ans:
10. When a referential integrity constraint is violated, normal procedure is to.
A. rejection the action
B. accept the action
C. both A & B
D. continue with the flow
Ans:
11. An SQL standard Allows a clause initially deferred to be added to a
A. isolation specification
B. constraint specification
C. atomicity specification
D. none of these
Ans:
12. The following is used to uniquely identifies the element in relation.
A. secondary key
B. primary key
C. candidate key
D. concatenate key
Ans:
13. Constraints are the preferred method for enforcing data
A. data topple
B. data integrity
C. data inheritance
D. none of these
Ans:
14. Snapshot isolation schemes do not support
A. write operation
B. read operation
C. serializability
D. none of the above
Ans:
15. The most easily tested constraints of a new data entered is into a database is called?
A. referential constraints
B. domain constraints
C. assertion
D. none of these
Ans:
16. Data integrity constraint is used to:
A. satisfy a condition that duplicate records are not inserted into the table
B. improve the quality of data entered for a specific property
C. both A & B
D. none of these
Ans: