1.

………………… is preferred method for enforcing data integrity

A. Constraints
B. Stored Procedure
C. Triggers
D. Cursors
Answer» B. Stored Procedure


Discussion

No Comment Found