Which of the following can be addressed by enforcing a referential integrity constraint
SQL Integrity Constraints Questions and AnswersIntegrity Constraints MCQs : This section focuses on the "Integrity Constraints" of the SQL. These Multiple Choice Questions (mcq) should be practiced to improve the SQL skills required for various interviews (campus interview, walk-in interview, company interview), placement, entrance exam and other competitive examinations. Show
1. To include integrity constraint in an existing relation use : A.
Modify table View Answer 2. Which of the following is not an integrity constraint? A. Not null View Answer 3. Foreign key is the one in which the ________ of one relation is referenced in another relation. A. Foreign key View Answer 4. Domain constraints, functional dependency and referential integrity are special forms of _________ A. Foreign key View Answer 5. Which of the following is the right syntax
for the assertion? A. CREATE ASSERTION [ assertion_name ] CHECK ( [ condition ] ); View Answer 6. Data integrity constraints are used to: A. Control who is allowed access to the data View Answer 7. Which of the following can be addressed by enforcing a referential integrity constraint? A. All phone numbers must include the area code View Answer 8. The relationship between the two tables are created using __________ A. Candidate Key View Answer 9. The Entity Customer has three candidate keys: a) CustId b) Email and c) ContactNo. Suggest the best primary key for this entity. A. CustId View Answer 10. Which of the following statement(s) is/are FALSE about primary key? A. There can be more than one primary key for a table View Answer 11. Data integrity control __________. A. is used to set upper and lower limits on numeric data View Answer 12. Referential triggered action clause in Standard Query Language is attached to constraint called A. primary key constraint View Answer 13. If the explicit value of attributes is not
provided in SQL then the value included in new tuple in such situation is called A. sampled statement View Answer 14. If the referential integrity constraint is violated then the specific action clause attached by the database designers other than by default action is classified as A. referential triggered action View Answer 15. Constraints that are applied on individual tuples and are verified whenever any tuple is modified or new tuple is inserted are called A. language based constraints View Answer 16. Which of the following is not a integrity constraint ? A. Not null View Answer 17. SQL standard allows a clause initially deferred to be added to a A. Uniqueness specification View Answer 18. When a referential-integrity constraint is violated, the normal procedure is to A. Continue with flow View Answer 19. The most easily tested constraints of a new data entered is into a database is called? A. referential constraints View Answer 20. Constraints are the preferred method for enforcing data A. data topple View Answer Also check :
Discussion * You must be logged in to add comment. Which of the following constraint is used for referential integrity?A foreign key constraint (also referred to as a referential constraint or a referential integrity constraint) is a logical rule about values in one or more columns in one or more tables. For example, a set of tables shares information about a corporation's suppliers.
Which of the following are the types of integrity constraints enforced by Rdbms Mcq?There are four types of integrity constraints in DBMS:. Domain Constraint.. Entity Constraint.. Referential Integrity Constraint.. Key Constraint.. Which of the following constraints is used to ensure the referential integrity of data in the table?FOREIGN KEY constraints for the rules associated with referential integrity. Oracle supports the use of FOREIGN KEY integrity constraints to define the referential integrity actions, including: Update and delete No Action. Delete CASCADE.
Which among the following are used to enforce domain integrity in a table in database?A check constraint, applied at the time of table creation, enforces domain integrity by limiting the set of values that can be assigned to a column.
|