The choice to enforce referential integrity is indicated in Design view by a thick ____

A. border around the table name
B. border around the primary key of the primary table
C. join line
D. red join line

Answer: C

Computer Science & Information Technology

You might also like to view...

A corporation would want to utilize a ________ network

A) peer-to-peer B) homegroup C) client-server D) workgroup

Computer Science & Information Technology

What are the four primary components of a public key infrastructure implementation?

A. Confidentiality, Integrity, Availability, and Non-repudiation B. Public key encryption, split-key encryption, initialization vectors, biometrics C. Symmetric encryption, asymmetric encryption, hashing, and digital certificates D. Authentication, Authorization, Accounting, and Availability

Computer Science & Information Technology