_______ is a preferred method for enforcing data integrity.AConstraintsBStored procedureCTriggersDCursorsAnswer: A. Constraints