1.

                         is preferred method for enforcing data integrity

A. constraints
B. stored procedure
C. triggers
D. cursors
Answer» B. stored procedure


Discussion

No Comment Found