Top

Discussion

______is a preferred method for enforcing data integrity
 

  • A.Constraints
  • B.Triggers
  • C.Stored procedure

  • D.Cursors

Answer: A

No answer description available for this question

No comment is present. Be the first to comment.
Loading…

Post your comment