SQL MCQs - Integrity Constraints

11. Data integrity constraints are used to:

A. Control who is allowed access to the data
B. Ensure that duplicate records are not entered into the table
C. Improve the quality of data entered for a specific property (i.e., table column)
D. Prevent users from changing the values stored in the table

View Answer


12. The relationship between the two tables are created using __________

A. Candidate Key
B. Primary Key
C. Foreign Key
D. Check Constraint

View Answer


13. Which of the following statement(s) is/are FALSE about primary key?

A. There can be more than one primary key for a table
B. Columns with string data types cannot be made Primary Key because they are large
C. Both A and B
D. None of the above

View Answer


14.  Referential triggered action clause in Standard Query Language is attached to constraint called

A. primary key constraint
B. stamped key constraint
C. interval notation constraint
D. foreign key constraint

View Answer


15.  If the referential integrity constraint is violated then the specific action clause attached by the database designers other than by default action is classified as

A. referential triggered action
B. foreign key triggered action
C. primary key triggered action
D. decimal triggered action

View Answer


16. Which of the following is not a integrity constraint ?

A. Not null
B. Positive
C. Unique
D. Check ‘predicate’

View Answer


17. SQL standard allows a clause initially deferred to be added to a

A. Uniqueness specification
B. Atomicity specification
C. Constraint specification
D. Isolation specification

View Answer


18. When a referential-integrity constraint is violated, the normal procedure is to

A. Continue with flow
B. Accept the action
C. Reject the action
D. Store it for evaluation

View Answer


19. The most easily tested constraints of a new data entered is into a database is called?

A. referential constraints
B. domain constraints
C. assertion
D. None of these

View Answer


20.  Constraints are the preferred method for enforcing data

A. data topple
B. data integrity
C. data inheritance
D. None of the above

View Answer






Also check :


Discussion


* You must be logged in to add comment.