A set of rules that Access uses to ensure that the data between related tables is valid

a. Cascade relationship
b. Referential integrity
c. Relationship balance

B

Computer Science & Information Technology

You might also like to view...

What's the hexadecimal equivalent of the binary number 1111 1111?

a. FF b. 255 c. EE d. DD

Computer Science & Information Technology

The object used by the Kerberos protocol to provide client verification is known as a ____.

A. password B. passphrase C. token D. ticket

Computer Science & Information Technology