What are the rules called that limit how data is entered into a database?

A) Data restrictions
B) Controls
C) Constraints
D) Database checks


Answer: C) Constraints

Computer Science & Information Technology

You might also like to view...

____ are particularly important in the case of physical security audits, because the auditors are not likely to have complete expertise in all of the areas being audited.

A. Procedures B. Checklists C. Baselines D. Standards

Computer Science & Information Technology

When creating a multitable query from scratch only include related tables in your query

Indicate whether the statement is true or false

Computer Science & Information Technology

When the default body or heading font in a document is changed, all new text in that document will use the new font

Indicate whether the statement is true or false

Computer Science & Information Technology

An administrator user can sign in using ____ mode.?

A. ?safe B. ?basic C. ?general D. ?Microsoft

Computer Science & Information Technology