1.

____________ is preferred method for enforcing data integrity.

A. Constraints
B. Stored Procedure
C. Triggers
D. Cursors
Answer» B. Stored Procedure


Discussion

No Comment Found