What are the rules called that limit how data is entered into a database?
A) Data restrictions
B) Controls
C) Constraints
D) Database checks
Answer: C) Constraints
Computer Science & Information Technology
You might also like to view...
____ are particularly important in the case of physical security audits, because the auditors are not likely to have complete expertise in all of the areas being audited.
A. Procedures B. Checklists C. Baselines D. Standards
Computer Science & Information Technology
When creating a multitable query from scratch only include related tables in your query
Indicate whether the statement is true or false
Computer Science & Information Technology
When the default body or heading font in a document is changed, all new text in that document will use the new font
Indicate whether the statement is true or false
Computer Science & Information Technology
An administrator user can sign in using ____ mode.?
A. ?safe B. ?basic C. ?general D. ?Microsoft
Computer Science & Information Technology