Input masks provide ________ rules that help prevent individuals from entering invalid data and help ensure that individuals enter data in a consistent manner

A) integrity B) database C) query D) data validation

D

Computer Science & Information Technology

You might also like to view...

The lower part of the Query Design window is known as the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which rating system uses a concept called a protection profile?

A. TSEC B. ITSEC C. Common Criteria D. Red Book

Computer Science & Information Technology