In a ________, whenever the data in the first table is modified, all the related occurrences of the data in the second table are also modified

A) cascading update B) linked change C) linked update D) cascading change

A

Computer Science & Information Technology

You might also like to view...

Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In Excel, all formulas are preceded by what sign?

Computer Science & Information Technology