1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
3 years ago
14

Create a trigger that prevents anychange(insert, update, or delete)to the grade attribute of the takesrelation that would change

the total credits of the corresponding student by more than 10 credits. For example, if thecurrent total credits of Sanchez are38, then any change that makes histotal credits greater than 48 or less than 28 would be prevented.b)(10points)Test thetrigger with three distinct events: one insert, one update, and one delete
Computers and Technology
1 answer:
Alchen [17]3 years ago
5 0

Answer:

The trigger code is given below

create trigger F1_Del

after delete on Friend

for each row

when exists (select * from Friend

where ID1 = Old.ID2 and ID2 = Old.ID1)

begin

delete from Friend

where (ID1 = Old.ID2 and ID2 = Old.ID1);

end

create trigger F1_Insert

after insert on Friend

for each row

when not exists (select * from Friend

where ID1 = New.ID2 and ID2 = New.ID1)

begin

insert into Friend values (New.ID2, New.ID1);

end

You might be interested in
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
Use this illustration to answer the question.
Mademuasel [1]

Answer:

very high voltage hope this helps

Explanation:

4 0
3 years ago
TASK: Write a static method called repeatString that takes as input a String parameter word followed by an int parameter num. It
leva [86]

Answer:

Follows are the method definition to this question:

public static String repeatString(String word, int num)//defining a String method repeatString that takes two parameters

{

   String Val= "";//defining String variable Val

   for(int x = 0;x<num;x++)//defining for loop to calculate number of string

   {

       Val=Val+word;//hold calculated value in Val

   }

   return Val;//return Val value

}

Explanation:

Follows are the full code to this question:

import java.util.*;//import package for user input

public class Main//defining class Main

{

   public static String repeatString(String word, int num)//defining a String method repeatString that takes two parameters

{

   String Val= "";//defining String variable Val

   for(int x = 0;x<num;x++)//defining for loop to calculate number of string

   {

       Val=Val+word;//hold calculated value in Val

   }

   return Val;//return Val value

}

public static void main(String[] ar)//defining main method

{

   int num;//defining integer variable

   String word; //defining String variable

   Scanner on=new Scanner(System.in);//creating Scanner class Object

   System.out.print("Enter numeric value: ");//print message

   num=on.nextInt();//input value

   System.out.print("Enter String value: ");//print message

   word=on.next();//input value

   System.out.print(repeatString(word,num));//call method and print its return value

}

}

Output:

Enter numeric value: 3

Enter String value: data

datadatadata

Description:

Inside the main class,  a static string method "repeatString" is defined that accepts two parameters "word and num", in which one is a string and one is an integer.

Inside the method, the string variable "Val" is defined, which uses the "for" loop to calculate the number of string and store its value in the variable.

In the main class, the above two variables are defined, that uses the Scanner class object for input the value and pass into the method and print its value.

6 0
3 years ago
How do you make computers or microwaves?
solniwko [45]

Answer:

Using the correct parts.

Explanation:

A computer requires a bunch of parts to be put together, it can be really fun to do. What I recommend doing, if you are wanting to create your own computer is to search online what are the necessary parts and then watch a "creating YOUR first PC" video :)

Hope this helped,

Zaxoosh.

8 0
3 years ago
What happens if a spelling checker does not have a suggestion for a misspelled word?
Viktor [21]
Then the misspelled word is not a word probably, either that or the misspelled word doesn’t look like the desired word
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the typical relationship between time and interest rate?
    12·1 answer
  • True or False: Metadata is not visible to the website user
    11·2 answers
  • What keyboard shortcut keys selects cell A1
    12·1 answer
  • Which answer would it be?
    12·1 answer
  • jakie krasnale mieszkaja we wroclawiu i opisz kto napisal kronike, prosze nie kopiowac dlugich tekstow najlepiej by bylo opisac
    6·1 answer
  • Can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and commun
    9·1 answer
  • What necessarily happens when a photographer chooses to give either the aperture or the shutter speed priority?
    10·1 answer
  • Write your question here (Keep it clear and simple to get the best answer)
    13·2 answers
  • Write a program to input a number.Find the sum of digits and number of digits
    10·2 answers
  • What is missing link describe briefly with an example class 11?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!