Home

______is a preferred method for enforcing data integrity

A. Constraints

B. Triggers

C. Stored procedure

D. Cursors

Please do not use chat terms. Example: avoid using "grt" instead of "great".