Computer Sciences Chapter 4 Class 12 Choices and Decisions


NUST Entry test NET contains most of the Computer Sciences MCQs. FSC ICS Part 1 Computer book MCQs. HSSC Computer Sciences CS questions MCQs. Solved Chapterwise Computer Sciences MCQs for first-year 11 class MCQs. Second-year and first-year Computer Sciences textbooks chapter-wise MCQs with the answer are provided here. PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

8. problems occurs when same name is used for two different attributes:

1/20

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

2/20

19. A process in which it is being ensured that attributes are stored from where they belong

3/20

20. A process of analyzing the dependencies of attributes with in entities is called

4/20

5. Different attributes in two different tables having same name are referred to as (

5/20

6. Referential integrity is applied on

6/20

12. Data integrity is another form of data

7/20

7. problems occurs when two different names are used for the same information?

8/20

15. In which of the following normal forms, any repeating group from the table is removed?

9/20

13. Integrity is concerned with the (

10/20

14. A foreign key constraint is also called

11/20

3. The constraint states that in a relation no primary key value can have a null value.

12/20

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

13/20

11. A functional dependency between two or more non-key attributes in a relation is called

14/20

1. In 3NF, which form of dependency is removed? (

15/20

9. problems occurs when same information is stored in two different ways:

16/20

16. A relation is in second normal form if and only if:

17/20

2. How many types of data integrity are there?

18/20

4. In 3NF, a non-key attribute must not depend on a(n)

19/20

10. The process of converting complex data structure into simple and stable data structure is called: a –

20/20
,

Protected

Open chat
Salam
Can we help you?