

MCQOPTIONS
Saved Bookmarks
1. |
____________ is preferred method for enforcing data integrity. |
A. | Constraints |
B. | Stored Procedure |
C. | Triggers |
D. | Cursors |
Answer» B. Stored Procedure | |