A set of rules that Access uses to ensure that the data between related tables is valid.

A. Cascade relationship
B. Referential integrity
C. Relationship balance
D. Record validity

B. Referential integrity

Computer Science & Information Technology

You might also like to view...

By using a digital signature, you confirm that the document or macro originated from the signer and has not been ________

A) altered B) lost C) deleted D) saved

Computer Science & Information Technology

_______ are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school.

A. WANs B. PANs C. LANs D. BANs

Computer Science & Information Technology