List of important Integrity constraints MCQ questions and Answers.

1. by including integrity constraints in existing relations we use?
A. update table
B. alert table
C. delete table
D. create table
Ans:

Answer - Click Here:
A

2. Which one are not the integrity constraints?
A. identical
B. not null
C. unique
D. none of these
Ans:
Answer - Click Here:
A

3. The key is the one in which the primary of one relation is referenced to another relation is called
A. primary key
B. foreign key
C. candidate key
D. concatenate key
Ans:
Answer - Click Here:
B

4. Following is the right syntax for assertion?
A. create assertion ‘predicates’;
B. create assertion check ‘predicate’ ‘assertion name’;
C. create ‘assertion-name’ check ‘predicates’;
D.all of the above
Ans:
Answer - Click Here:
C

5. Which of the following _____is preferred method for enforcing data integrity?
A. stored procedure
B. constraints
C. cursor
D. none of these
Ans:
Answer - Click Here:
B

6. Which of the following command in SQL is used to create a table?
A. MAKE TABLE
B. DLETE TABLE
C. UPDATE TABLE
D. CREATE TABLE
Ans:
Answer - Click Here:
D

7. CREATE TABLE course
( . . .
FOREIGN KEY (dept name) REFERENCES department
. . . );
The following code is used.
A. delete
B. delete tuple
C. delete cascade
D. none of these
Ans:
Answer - Click Here:
C

8. referential integrity constrains are also called?
A. superset dependencies
B. subset dependencies
C. functional dependencies
D. all of these
Ans:
Answer - Click Here:
C

9. Is oracle sport complex check condition.
A. yes
B. does not suport
C. no
D. none of these
Ans:
Answer - Click Here:
A

10. When a referential integrity constraint is violated, normal procedure is to.
A. rejection the action
B. accept the action
C. both A & B
D. continue with the flow
Ans:
Answer - Click Here:
A

11. An SQL standard Allows a clause initially deferred to be added to a
A. isolation specification
B. constraint specification
C. atomicity specification
D. none of these
Ans:
Answer - Click Here:
B

12. The following is used to uniquely identifies the element in relation.
A. secondary key
B. primary key
C. candidate key
D. concatenate key
Ans:
Answer - Click Here:
B

13. Constraints are the preferred method for enforcing data
A. data topple
B. data integrity
C. data inheritance
D. none of these
Ans:
Answer - Click Here:
B

14. Snapshot isolation schemes do not support
A. write operation
B. read operation
C. serializability
D. none of the above
Ans:
Answer - Click Here:
C

15. The most easily tested constraints of a new data entered is into a database is called?
A. referential constraints
B. domain constraints
C. assertion
D. none of these
Ans:
Answer - Click Here:
B

16. Data integrity constraint is used to:
A. satisfy a condition  that duplicate records are not inserted into the table
B. improve the quality of data entered for a specific property
C. both A & B
D. none of these
Ans:
Answer - Click Here:
B

Computer Science Repeated MCQs Book Download

Latest posts by Prof. Fazal Rehman Shamil (see all)