1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
3 years ago
7

Create a trigger that prevents anychange(insert, update, or delete)to the grade attribute of the takesrelation that would change

the total credits of the corresponding student by more than 10 credits. For example, if the current total credits of Sanchez are38, then any change that makes histotal credits greater than 48 or less than 28 would be prevented.
Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
6 0
Omg co ol like chicken is funny sometimes
You might be interested in
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Briefly explain the emerging trends in micro computer technology in relation to size
77julia77 [94]

A microcomputer is a small device composed of a central CPU with a microprocessor. Microcomputers are also called personal computers (PCs) and they are ultimately easier to transport.

<h3>What is a microcomputer?</h3>

A microcomputer refers to a personal computer, which is similar to an IBM PC device machine.

The term microcomputer was used in the 1970s, nowadays they are called personal computers, and PCs are being increasingly better both in usage and transportability.

The average personal computer has a weight of 20-30 pounds, in the future, it is believed that there will be no need for a personal computer (all data will be in the cloud).

Learn more about personal computers here:

brainly.com/question/4945544

7 0
2 years ago
Chris is working with other employees on a worksheet. the other employees have made comments, but they are not visible.
andriy [413]

Answer:

a. select show all comments on the review tab

Explanation:

Please mark me brainliest if correct

7 0
2 years ago
A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
GREYUIT [131]

Answer:

import java.util.Scanner;

public class LabProgram {

  public static void main(String[] args) {

      Scanner scnr = new Scanner(System.in);

      int inputYear;

      boolean isLeapYear;

      isLeapYear = false;

      inputYear = scnr.nextInt();

      // If a year is divisible by 400,  then it is a leap year

      if (inputYear % 400 == 0)

          isLeapYear = true;

      // If a year is divisible by 100,  then it is not a leap year

      if (inputYear % 100 == 0)

          isLeapYear = false;

      // If a year is divisible by 4,  then it is a leap year

      if (inputYear % 4 == 0)

          isLeapYear = true;

      if(isLeapYear)

          System.out.println(inputYear + " is a leap year.");

      else

          System.out.println(inputYear + " is not a leap year.");

  }

}

Explanation:

  • Take the year as an input from user and store it to inputYear variable.
  • If the year is a century year, check if the year is divisible by 400 ( the year must be evenly divisible by 400 ),  then set the boolean isLeapYear to true. If a year is divisible by 100,  then set the boolean isLeapYear to false. If a year is divisible by 4,  then set the boolean isLeapYear to true.
  • Check if isLeapYear is true, then print that it is a leap year. Otherwise, print that it is not a leap year.

Output:

1712

1712 is a leap year.

4 0
3 years ago
Read 2 more answers
What data unit is encapsulated inside a packet?
viva [34]

Answer: datagram

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What are some ways to accept data typed into a cell? Check all that apply.
    15·1 answer
  • In the movie evacuees, why were the children evacuated from large cities?
    11·1 answer
  • What does DKIM stand for?
    9·2 answers
  • When you set up a worksheet, you should use cell references in formulas whenever possible, rather than ____ values.
    11·1 answer
  • A new company will have 40 workstations in one building sharing a single network. All users must be able to share ¬les and print
    7·1 answer
  • Today's Apple Mac computers run with the same internal hardware as the Windows-based PC.
    10·2 answers
  • What is a Software that interprets commands drom the keyboard and mouse
    13·1 answer
  • List three ways of breaking a copyright law with the illegal copy of software.​
    11·1 answer
  • Working mechanism of computer ​
    10·1 answer
  • Every windows service has the 3 start types what are those service types?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!