A junction table contains data from the primary key fields in two tables
Indicate whether the statement is true or false
TRUE
Computer Science & Information Technology
You might also like to view...
Using the Enter button to confirm a cell entry keeps that cell the active cell
Indicate whether the statement is true or false.
Computer Science & Information Technology
The process of implementing network security starts with ____.
A. documentation B. evaluation C. assessment D. architecture
Computer Science & Information Technology