Input masks provide ________ rules that help prevent individuals from entering invalid data and help ensure that individuals enter data in a consistent manner
A) integrity B) database C) query D) data validation
D
Computer Science & Information Technology
You might also like to view...
The lower part of the Query Design window is known as the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which rating system uses a concept called a protection profile?
A. TSEC B. ITSEC C. Common Criteria D. Red Book
Computer Science & Information Technology