Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

____________ is preferred method for enforcing data integrity

a) Constraints
b) Stored Procedure
c) Triggers
d) Cursors

Answer: a
Explanation: Constraints are specified to restrict entries in the relation.

Join The Discussion