Cascade options enable you to make changes to related fields or records that would not be able to do if only referential integrity is enforced
Indicate whether the statement is true or false
TRUE
Computer Science & Information Technology
You might also like to view...
The process by which two parties can exchange keys over an unsecure medium is called a_______ protocol.
a) key-exchange. b) key-agreement. c) public-key. d) None of the above.
Computer Science & Information Technology
A(n) ____ is a list of instructions that accomplish a task.
A. algorithm B. index C. linked list D. procedure
Computer Science & Information Technology