Cyberwar consists of computer-based attacks conducted by ________.
A) national governments
B) terrorists
C) Both A and B
D) Neither A nor B
Question 2
When referential integrity is in effect you cannot delete a record in the primary key table until you have first deleted all the related records in the foreign key table.
Indicate whether the statement is true or false