The choice to enforce referential integrity is indicated in Design view by a thick ____
A. border around the table name
B. border around the primary key of the primary table
C. join line
D. red join line
Answer: C
Computer Science & Information Technology
You might also like to view...
A corporation would want to utilize a ________ network
A) peer-to-peer B) homegroup C) client-server D) workgroup
Computer Science & Information Technology
What are the four primary components of a public key infrastructure implementation?
A. Confidentiality, Integrity, Availability, and Non-repudiation B. Public key encryption, split-key encryption, initialization vectors, biometrics C. Symmetric encryption, asymmetric encryption, hashing, and digital certificates D. Authentication, Authorization, Accounting, and Availability
Computer Science & Information Technology