A set of rules that Access uses to ensure that the data between related tables is valid
a. Cascade relationship
b. Referential integrity
c. Relationship balance
B
Computer Science & Information Technology
You might also like to view...
What's the hexadecimal equivalent of the binary number 1111 1111?
a. FF b. 255 c. EE d. DD
Computer Science & Information Technology
The object used by the Kerberos protocol to provide client verification is known as a ____.
A. password B. passphrase C. token D. ticket
Computer Science & Information Technology