A set of rules that Access uses to ensure that the data between related tables is valid.
A. Cascade relationship
B. Referential integrity
C. Relationship balance
D. Record validity
B. Referential integrity
Computer Science & Information Technology
You might also like to view...
By using a digital signature, you confirm that the document or macro originated from the signer and has not been ________
A) altered B) lost C) deleted D) saved
Computer Science & Information Technology
_______ are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school.
A. WANs B. PANs C. LANs D. BANs
Computer Science & Information Technology