1.

______is a preferred method for enforcing data integrity

A. Constraints
B. Triggers
C. Stored procedure
D. D.
Answer» B. Triggers


Discussion

No Comment Found