SQL MCQs - Integrity Constraints

11. Data integrity constraints are used to:

A. Control who is allowed access to the data
B. Ensure that duplicate records are not entered into the table
C. Improve the quality of data entered for a specific property (i.e., table column)
D. Prevent users from changing the values stored in the table

View Answer

12. The relationship between the two tables are created using __________

A. Candidate Key
B. Primary Key
C. Foreign Key
D. Check Constraint

View Answer

13. Which of the following statement(s) is/are FALSE about primary key?

A. There can be more than one primary key for a table
B. Columns with string data types cannot be made Primary Key because they are large
C. Both A and B
D. None of the above

View Answer

14.  Referential triggered action clause in Standard Query Language is attached to constraint called

A. primary key constraint
B. stamped key constraint
C. interval notation constraint
D. foreign key constraint

View Answer

15.  If the referential integrity constraint is violated then the specific action clause attached by the database designers other than by default action is classified as

A. referential triggered action
B. foreign key triggered action
C. primary key triggered action
D. decimal triggered action

View Answer

16. Which of the following is not a integrity constraint ?

A. Not null
B. Positive
C. Unique
D. Check ‘predicate’

View Answer

17. SQL standard allows a clause initially deferred to be added to a

A. Uniqueness specification
B. Atomicity specification
C. Constraint specification
D. Isolation specification

View Answer

18. When a referential-integrity constraint is violated, the normal procedure is to

A. Continue with flow
B. Accept the action
C. Reject the action
D. Store it for evaluation

View Answer

19. The most easily tested constraints of a new data entered is into a database is called?

A. referential constraints
B. domain constraints
C. assertion
D. None of these

View Answer

20.  Constraints are the preferred method for enforcing data

A. data topple
B. data integrity
C. data inheritance
D. None of the above

View Answer

Also check :


* You must be logged in to add comment.