Q.

                         is preferred method for enforcing data integrity

A. constraints
B. stored procedure
C. triggers
D. cursors
Answer» A. constraints
2.3k
0
Do you find this helpful?
1

Discussion

No comments yet