1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
3 years ago
14

Create a trigger that prevents anychange(insert, update, or delete)to the grade attribute of the takesrelation that would change

the total credits of the corresponding student by more than 10 credits. For example, if thecurrent total credits of Sanchez are38, then any change that makes histotal credits greater than 48 or less than 28 would be prevented.b)(10points)Test thetrigger with three distinct events: one insert, one update, and one delete
Computers and Technology
1 answer:
Alchen [17]3 years ago
5 0

Answer:

The trigger code is given below

create trigger F1_Del

after delete on Friend

for each row

when exists (select * from Friend

where ID1 = Old.ID2 and ID2 = Old.ID1)

begin

delete from Friend

where (ID1 = Old.ID2 and ID2 = Old.ID1);

end

create trigger F1_Insert

after insert on Friend

for each row

when not exists (select * from Friend

where ID1 = New.ID2 and ID2 = New.ID1)

begin

insert into Friend values (New.ID2, New.ID1);

end

You might be interested in
How is this fictional tex in the people could fly different from the nonfictional text​
jenyasd209 [6]
The answer to this is C.
6 0
3 years ago
Read 2 more answers
The smallest building block of a wireless lan is a ______.
Anarel [89]
Wireless LAN, or also denoted as WLAN is a Local Area Network that uses wireless communication. The standard for WLAN is given in IEEE <span>802.11 </span><span>
The smallest building block of a Wireless LAN is a basic service set (BSS).</span><span> This set consists of wireless stations which are executing the same MAC protocol and competing for access to the same shared wireless system.</span>
6 0
3 years ago
Explain the characteristics of 1st generation computers​
levacccp [35]

Explanation:

i hope this is the right answer

!st generation computers were more big and bulky and you for sure could not bring them around everywhere.

8 0
3 years ago
The first documented use of work release was in the ____.
sattari [20]
I'd say in the United States.

This United States penological practice was inaugurated in 1913 by state senator Henry Huber. Typically, under the work release program, a prisoner who is sufficiently trusted  is employed outside the jail during working hours and returns to confinement at the end of the shift.



6 0
3 years ago
Dante went to change the date for an appointment in his Outlook calendar. He double-clicked in the appointment and made the chan
meriva

The correct answer is that Dante did not click the Save and Close button before exiting the appointment.

When you make a change to an appointment in the Outlook calendar you need to click on Save in order to have the change saved in your calendar. If you do not do this the appointment will revert back to the original time and date when you exit the program.

3 0
3 years ago
Other questions:
  • Documents on the web stored on web servers are known as web _____.
    6·1 answer
  • In Python,The sum of the elements in a tuple can be recusively calculated as follows:The sum of the elements in a tuple of size
    5·1 answer
  • ? Question
    6·2 answers
  • What are some benefits of 3-D printing?
    9·1 answer
  • Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
    13·1 answer
  • Raul is a 13-year-old teenager interested in taking up photography as a new hobby. His dad wants to buy him a camera for his bir
    13·1 answer
  • Laptops are used for accessing the internet. Name two advantages and two disadvantages for using a laptop rather than a smartpho
    5·2 answers
  • Davingould1115...................answer 3​
    11·1 answer
  • PLS HELP SOON
    15·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!