When a relationship is defined to enforce referential integrity and Cascade ________ Related Fields, Access will automatically change the data through all related tables when data is removed from the table that contains the primary key

A) Change B) Delete C) Remove D) Update

B

Computer Science & Information Technology

You might also like to view...

Actions can be moved around by ________ them to the desired location

Fill in the blank(s) with correct word

Computer Science & Information Technology

Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case. ? Where can Zach go to check the security logs?

A. NTbtlog.txt B. Event Viewer C. Antivirus security logs D. Action Center

Computer Science & Information Technology