When a relationship is defined to enforce referential integrity and Cascade ________ Related Fields, Access will automatically change the data through all related tables when data is removed from the table that contains the primary key
A) Change B) Delete C) Remove D) Update
B
Computer Science & Information Technology
You might also like to view...
Actions can be moved around by ________ them to the desired location
Fill in the blank(s) with correct word
Computer Science & Information Technology
Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case. ? Where can Zach go to check the security logs?
A. NTbtlog.txt B. Event Viewer C. Antivirus security logs D. Action Center
Computer Science & Information Technology