Chapter 3

Ace your homework & exams now with Quizwiz!

14) The functional dependency noted as A → B means that the value of A can be determined from the value of B.

Answer: FALSE AACSB: Information Technology Difficulty: Easy LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

15) In the functional dependency shown as A → B, B is the determinant.

Answer: FALSE AACSB: Information Technology Difficulty: Easy LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

52) When designing or normalizing relations, each relation should have only one theme.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To be able to identify possible insertion, deletion, and update anomalies in a relation Classification: Concept

41) Any table that meets the definition of a relation is said to be in first normal form (1NF).

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To be able to place a relation into BCNF normal form Classification: Concept

23) A row can be uniquely identified by a key.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

27) A candidate key is one of a group of keys that may serve as the primary key in a relation.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

30) A surrogate key is an artificial column that is added to a relation to be its primary key.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

32) Surrogate keys are normally not shown on forms or reports.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

33) A foreign key is one or more columns in one relation that also is the primary key in another table.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

6) In relational terms as defined by E.F. Codd, a row is called a tuple.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To understand alternative terminology used in describing the relational model Classification: Concept

7) In relational terms as defined by E.F. Codd, a column is called an attribute.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To understand alternative terminology used in describing the relational model Classification: Concept

1) All relations are tables, but not all tables are relations.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To understand basic relational terminology Classification: Concept

3) A characteristic of a relation is that the cells of the relation hold a single value.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To understand the characteristics of relations Classification: Concept

5) A relation is a table composed of columns and rows.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To understand the characteristics of relations Classification: Concept

11) If by knowing the value of A we can find the value of B, then we would say that B is functionally dependent on A.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

13) Attribute Y is functionally dependent on attribute X if the value of attribute X determines the value of Y.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

17) Given the functional dependency (A, B) → C, the attributes (A, B) are referred to as a composite determinant.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

18) Given the functional dependency A → (B, C), then it is true that A → B and A → C.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

67) Given the functional dependency (A, B) → C, then ________.

A) A and B together → C B) A → C C) B → A D) Both A and B are correct Answer: A AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

Number Color

1 Red 2 Blue 3 White 4 Green 5 Green 6 Green

69) Which of the following is true about the functional dependency (A, B) → (C, D)?

A) A is the determinant of C. B) A and B together are determined by C and D together. C) A and B together determine D. D) C and D together determine A. Answer: C AACSB: Information Technology Difficulty: Difficult LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

59) Which of the following is not true about a relation?

A) Has rows containing data about an entity B) Has columns containing data about attributes of the entity C) Has cells that hold only a single value D) Can have two identical rows Answer: D AACSB: Information Technology Difficulty: Easy LO: To understand the characteristics of relations Classification: Concept

87) If a relation is in BCNF, and each multivalued dependency has been moved to a relation of its own, then the first relation is in ________.

A) Third Normal Form B) Boyce-Codd Normal Form C) Fourth Normal Form D) Domain/key normal form Answer: C AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation in fourth normal form Classification: Concept

68) Which of the following is NOT true about the functional dependency A → (X, Y)?

A) X is functionally dependent on A. B) A determines Y. C) X and Y together determine A. D) X and Y are functionally dependent on A. Answer: C AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

83) A relation is in second normal form (2NF) if and only if it is in 1NF and ________.

A) all non-key attributes are determined by the entire primary key B) there are no non-key attributes determined by another non-key attribute C) every attribute is a candidate key D) every candidate key is a determinant Answer: A AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation into BCNF normal form Classification: Concept

84) A relation is in third normal form (3NF) if and only if it is in 2NF and ________.

A) all non-key attributes are determined by the entire primary key B) there are no non-key attributes determined by another non-key attribute C) every attribute is a candidate key D) every candidate key is a determinant Answer: B AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation into BCNF normal form Classification: Concept

85) A relation is in Boyce-Codd normal form (BCNF) if and only if it is in 3NF and ________.

A) all non-key attributes are determined by the entire primary key B) there are no non-key attributes determined by another non-key attribute C) every attribute is a candidate key D) every determinant is a candidate key Answer: D AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation into BCNF normal form Classification: Concept 86) If a table is designed so that every determinant is a candidate key, then that relation is in ________. A) First Normal Form B) Second Normal Form C) Third Normal Form D) Boyce-Codd Normal Form Answer: D AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation into BCNF normal form Classification: Concept

76) A key consisting of one or more columns that is a primary key in another relation is a ________.

A) composite key B) candidate key C) foreign key D) surrogate key Answer: C AACSB: Information Technology Difficulty: Moderate LO: To identify primary, candidate, and composite keys Classification: Concept

77) Referential integrity constraints are used to limit the possible values of a ________.

A) composite key B) candidate key C) foreign key D) surrogate key Answer: C AACSB: Information Technology Difficulty: Moderate LO: To identify primary, candidate, and composite keys Classification: Concept 78) A ________ is used to limit the possible values of a foreign key. A) composite key B) surrogate key C) functional dependency D) referential integrity constraint Answer: D AACSB: Information Technology Difficulty: Moderate LO: To identify primary, candidate, and composite keys Classification: Concept

75) An artificial column added to a relation to serve as the primary key is a ________.

A) composite key B) candidate key C) foreign key D) surrogate key Answer: D AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

89) A relation is in domain/key normal form if ________.

A) every key of the relation is a logical consequence of the definition of constraints and determinants B) every key of the relation is a logical consequence of the definition of constraints and domains C) every constraint on the relation is a logical consequence of the definition of keys and determinants D) every constraint on the relation is a logical consequence of the definition of keys and domains Answer: D AACSB: Information Technology Difficulty: Moderate LO: To understand the special importance of domain/key normal form Classification: Concept 90) In general, each relation should have ________. A) one and only one theme B) one or more themes C) exactly two themes D) one or two themes Answer: A AACSB: Information Technology Difficulty: Easy LO: To understand the characteristics of relations Classification: Concept

65) Given the functional dependency A → (B, C), A is a(n) ________.

A) independent variable B) dependent variable C) determinant D) composite determinant Answer: C AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept 66) Given the functional dependency (A, B) → C, (A, B) is a ________. A) dependent variable B) determinant C) composite determinant D) Both B and C are correct Answer: D AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

79) Having to enter facts about two entities when we want to enter facts about only one is an example of ________.

A) insertion anomaly B) update anomaly C) deletion anomaly D) normalization anomaly Answer: A AACSB: Information Technology Difficulty: Moderate LO: To be able to identify possible insertion, deletion, and update anomalies in a relation Classification: Concept

35) A constraint that requires an instance of an entity to exist in one relation before it can be referenced in another relation is called an insertion anomaly.

Answer: FALSE AACSB: Information Technology Difficulty: Difficult LO: To identify primary, candidate, and composite keys Classification: Concept

81) Suppose that you need to update one value of the column SalesCost in a relation. The way the relation is constructed, this value needs to be changed in three different rows. However, you only change the value in two of the rows. You have just created a(n) ________.

A) normalization anomaly B) insertion anomaly C) update anomaly D) deletion anomaly Answer: C AACSB: Information Technology Difficulty: Moderate LO: To be able to identify possible insertion, deletion, and update anomalies in a relation Classification: Concept 82) A table that meets the definition of a relation is in ________. A) First Normal Form B) Second Normal Form C) Third Normal Form D) Boyce-Codd Normal Form Answer: A AACSB: Information Technology Difficulty: Easy LO: To be able to identify possible insertion, deletion, and update anomalies in a relation Classification: Concept

71) A combination of one or more columns used to identify rows in a relation is a ________.

A) record B) field C) key D) tuple Answer: C AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

73) A determinant that determines all the other columns in a relation is a ________.

A) record B) surrogate key C) foreign key D) candidate key Answer: D AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept 74) When designing a database, one of the candidate keys in a relation is selected as the ________. A) composite key B) primary key C) foreign key D) surrogate key Answer: B AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

70) The only reason(s) for having relations is to ________.

A) store instances of functional dependencies B) store equation components C) store equation results D) Both B and C are correct Answer: A AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

63) An attribute is also known as a ________.

A) table B) relation C) row D) column Answer: D AACSB: Information Technology Difficulty: Easy LO: To understand alternative terminology used in describing the relational model Classification: Concept

62) A tuple is also known as a ________.

A) table B) relation C) row D) field Answer: C AACSB: Information Technology Difficulty: Easy LO: To understand alternative terminology used in describing the relational model Classification: Concept

61) A relation is also known as a(n) ________.

A) table B) tuple C) relationship D) attribute Answer: A AACSB: Information Technology Difficulty: Easy LO: To understand alternative terminology used in describing the relational model Classification: Concept

64) Saying that two entities are functionally dependent means that ________.

A) the entities are always connected by a mathematical equation B) for one of the entities, if we are given the value of that entity, we can determine the value of one other entity C) for both entities, if we are given the value of one entity, we can determine the value of the other entity D) the functional dependency will have to be removed through normalization Answer: B AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

In this case, Number functionally determines Color, written as Number → Color. Then, if we know the Number is 3, we know the Color is White. Note that the reverse is not true—Color does not determine Number since if we are given the Color Green the number could be 4, 5, or 6. The attribute on the left-hand side of the dependency is called the "determinant." Thus, Number is a determinant. Although equations can be expressed as functional dependencies [as when the equation TotalCost = NumberSold * ItemCost is written as the functional dependency (NumberSold, ItemCost) → TotalCost] functional dependencies are not equations. Also note that a determinant can have more than one attribute [as does (NumberSold, ItemCost) in the last example] and when it does it is called a composite determinant.

AACSB: Information Technology Difficulty: Easy LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Application

94) Distinguish between the primary key and a candidate key.

Answer: Both the primary key and a candidate key can uniquely identify the rows in a table. The primary key is the candidate key that is chosen by the database designer, working with the users, to uniquely identify rows and to represent relationships. Although any candidate key could, by definition, be selected to act as the primary key, the choice of primary key is often based on design decisions such as the amount of foreign key data that would be generated. AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

47) Candidate keys are called interlocking candidate keys when they share one or more attributes.

Answer: FALSE AACSB: Information Technology Difficulty: Difficult LO: To be able to place a relation into BCNF normal form Classification: Concept

26) It is possible to have a relation that does not have a key.

Answer: FALSE AACSB: Information Technology Difficulty: Difficult LO: To identify primary, candidate, and composite keys Classification: Concept

42) Any table that meets the definition of a relation is in 2NF.

Answer: FALSE AACSB: Information Technology Difficulty: Easy LO: To be able to place a relation into BCNF normal form Classification: Concept 43) A relation is in 2NF if and only if it is in 1NF, and all non-key attributes are determined by the entire primary key. Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation into BCNF normal form Classification: Concept

24) A combination key is a group of attributes that uniquely identifies a row.

Answer: FALSE AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

8) The columns of a relation are sometimes called tuples.

Answer: FALSE AACSB: Information Technology Difficulty: Easy LO: To understand alternative terminology used in describing the relational model Classification: Concept

9) A tuple is a group of one or more columns that uniquely identifies a row.

Answer: FALSE AACSB: Information Technology Difficulty: Easy LO: To understand alternative terminology used in describing the relational model Classification: Concept

2) A relation is a table that has special restrictions on it.

Answer: FALSE AACSB: Information Technology Difficulty: Easy LO: To understand the characteristics of relations Classification: Concept

20) Given the functional dependency A → B, then it is necessarily true that B → A.

Answer: FALSE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

37) If a table meets the minimum definition of a relation, it has an effective or appropriate structure.

Answer: FALSE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify possible insertion, deletion, and update anomalies in a relation Classification: Concept

28) A relation can have only one candidate key.

Answer: FALSE AACSB: Information Technology Difficulty: Moderate LO: To identify primary, candidate, and composite keys Classification: Concept 29) A primary key is a candidate key that has been selected to uniquely identify rows in a relation. Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

4) A characteristic of a relation is that the rows of a relation may hold identical values.

Answer: FALSE AACSB: Information Technology Difficulty: Moderate LO: To understand the characteristics of relations Classification: Concept

92) Describe the requirements that a table must meet to qualify as a relation.

Answer: For a table to meet the requirements of a relation, it must satisfy certain conditions. First, the rows contain data about an entity or some portion of the entity. Second, the columns contain data that represent attributes of the entity. Third, each column must contain the same kind of data for all rows. Fifth, each column must have a unique name. Sixth, the cells must contain single values—no group or array values are allowed. Seventh, the order of the columns and the rows is insignificant. Finally, the rows must be unique. AACSB: Information Technology Difficulty: Easy LO: To understand the characteristics of relations Classification: Concept 93) Explain the terms relation, tuple, and attribute. Answer: The terms relation, tuple, and attribute are used primarily by database theoreticians. These terms are synonymous with the terms table, row, and column, respectively, in regards to a relational database. They are also equivalent to the terms file, record, and field, which tend to be used by many traditional data processing professionals. AACSB: Information Technology Difficulty: Easy LO: To understand alternative terminology used in describing the relational model Classification: Concept

96) Explain the relationships among primary keys and functional dependencies.

Answer: Relations store instances of functional dependencies in their rows. All primary keys represent a functional dependency, since each primary key functionally determines the entire row. Since the primary key determines the entire row, if a primary key were duplicated in a relation, then the entire row would have to be duplicated. Since a relation can contain no duplicate rows, the primary key must be unique. AACSB: Information Technology Difficulty: Difficult LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Synthesis

45) The condition that a non-key attribute determines another non-key attribute is known as transitive dependency.

Answer: TRUE AACSB: Information Technology Difficulty: Difficult LO: To be able to place a relation into BCNF normal form Classification: Concept

46) An attribute is a non-key attribute when it is a non-prime attribute, which means that the attribute is not contained in any candidate key.

Answer: TRUE AACSB: Information Technology Difficulty: Difficult LO: To be able to place a relation into BCNF normal form Classification: Concept

10) A functional dependency is a relationship between attributes such that if we know the value of one attribute, we can determine the value of the other attribute.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

12) In functional dependencies, the attribute whose value is known or given is referred to as the determinant.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

16) Functional dependencies can involve groups of attributes.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept

54) The multivalued dependency noted as A → → B, means that the value of A determines a set of values of B.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To be able to identify multivalued dependencies Classification: Concept

39) A deletion anomaly exists when deleting data about one entity results in the loss of data about another entity.

Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To be able to identify possible insertion, deletion, and update anomalies in a relation Classification: Concept

21) A determinant of a functional dependency may or may not be unique in a relation.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify functional dependencies, determinants, and dependent attributes Classification: Concept 22) A key is a combination of one or more columns that is used to identify particular rows in a relation. Answer: TRUE AACSB: Information Technology Difficulty: Easy LO: To identify primary, candidate, and composite keys Classification: Concept

53) A multivalued dependency exists when a determinant is matched to a set of values.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify multivalued dependencies Classification: Concept

55) A relation is in 4NF when multivalued dependencies are isolated in their own relation.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify multivalued dependencies Classification: Concept

56) A relation is in 4NF if it is in BCNF and it has no multivalued dependencies.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify multivalued dependencies Classification: Concept

38) Undesirable consequences of changing the data in a relation are called modification anomalies.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify possible insertion, deletion, and update anomalies in a relation Classification: Concept

40) Relations are classified into normal forms based on the types of modification anomalies that they are vulnerable to.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to identify possible insertion, deletion, and update anomalies in a relation Classification: Concept

49) A relation is in Boyce Codd Normal Form (BCNF) if and only if it is in 3NF and every determinant is a candidate key.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation into BCNF Classification: Concept

44) A relation is in 3NF if and only if it is in 2NF, and there are no non-key attributes determined by another non-key attribute.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation into BCNF normal form Classification: Concept

48) A relation is in Boyce-Codd Normal Form (BCNF) if and only if it is in 3NF and every determinant is a candidate key.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation into BCNF normal form Classification: Concept

50) Every time we break up a relation during the normalization process, we may have to create a referential integrity constraint.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation into BCNF normal form Classification: Concept

51) The essence of normalization is taking a relation that is not in BCNF and breaking it into multiple relations such that each one is in BCNF.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To be able to place a relation into BCNF normal form Classification: Concept

34) A referential integrity constraint is used to make sure the values of a foreign key match a valid value of a primary key.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To identify primary, candidate, and composite keys Classification: Concept

36) A referential integrity constraint limits the values of a foreign key.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To identify primary, candidate, and composite keys Classification: Concept

57) Domain/key normal form requires that every constraint be a logical consequence of the definition of domains and keys.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To understand the special importance of domain/key normal form Classification: Concept

58) A relation that is in domain/key normal form is assured to be free from all anomalies.

Answer: TRUE AACSB: Information Technology Difficulty: Moderate LO: To understand the special importance of domain/key normal form Classification: Concept

99) Explain the essence of normalization that is implemented using normal forms.

Answer: The essence of normalization is to create relations that contain data on a single theme, and for each row in a relation to contain all the data about that theme for a given entity. This essence is implemented in the normal forms by taking a relation that contains data on more than one theme and splitting it into multiple relations that each contains data on a single theme. The different normal forms protect against the occurrence of modification anomalies. In practice, making sure all relations are in Boyce-Codd Normal Form (BCNF), or in Fourth Normal Form (4NF) if multivalued dependencies are found, insures high reliability of the database. AACSB: Information Technology Difficulty: Difficult LO: To be able to place a relation into BCNF normal form Classification: Application

95) Briefly describe the various tasks of the primary key.

Answer: The primary key is used for four primary tasks. First, it is used to uniquely identify the rows in a table. Second, it is used to represent rows in relationships. Third, most DBMS products use the values of the primary key to organize the storage of the relation. Finally, primary keys are used in indexes and other structures to improve performance for search operations. AACSB: Information Technology Difficulty: Moderate LO: To identify primary, candidate, and composite keys Classification: Concept


Related study sets

Apprentice Lineman General Knowledge

View Set

NSC 3361 - Chapter 9, BIOL 3370 - Lecture 10, BIOL 3370 - Lecture 9, BIO 3370 - lecture 8, BIOL 3370 - lecture 7

View Set

NEETS MODULE 10-Wave Propagation, Transmission Lines, and Antennas CH2

View Set

Chpt 24 Functional and Dysfunctional Uterine Bleeding

View Set

Google Analytics Academy Fundamentals

View Set

Personal Finance Ch. 1 Study Guide

View Set