in Others edited by
659 views
0 votes
0 votes

Specify, which of the following is preferred method for enforcing data integrity?

  1. Constraints

  2. Stored procedure

  3. Triggers

  4. Cursors

in Others edited by
by
659 views

1 Answer

0 votes
0 votes

Answer is: Option A) Constraints