______is a preferred method for enforcing data integrity
Answer: A
No answer description available for this question