Cascade options enable you to make changes to related fields or records that would not be able to do if only referential integrity is enforced

Indicate whether the statement is true or false

TRUE

Computer Science & Information Technology

You might also like to view...

The process by which two parties can exchange keys over an unsecure medium is called a_______ protocol.

a) key-exchange. b) key-agreement. c) public-key. d) None of the above.

Computer Science & Information Technology

A(n) ____ is a list of instructions that accomplish a task.

A. algorithm B. index C. linked list D. procedure

Computer Science & Information Technology