Q.

………………… is preferred method for enforcing data integrity

A. Constraints
B. Stored Procedure
C. Triggers
D. Cursors
Answer» A. Constraints
1.6k
0
Do you find this helpful?
20

Discussion

No comments yet