1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
3 years ago
7

Create a trigger that prevents anychange(insert, update, or delete)to the grade attribute of the takesrelation that would change

the total credits of the corresponding student by more than 10 credits. For example, if the current total credits of Sanchez are38, then any change that makes histotal credits greater than 48 or less than 28 would be prevented.
Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
6 0
Omg co ol like chicken is funny sometimes
You might be interested in
Coment on this if your user starts with dida
ratelena [41]

Answer:

oh sorry i needed points but i have a friend whos user starts with dida

Explanation:

8 0
2 years ago
Unwanted or unneeded software included by manufacturers on new computers is called
Travka [436]
The answer is called bloatware. This is unneeded files that are actually on the computers which are already there even if it's new. It doesn't have any essential function and sometimes is a trial version. The application also adds up space which limits your free space storage. In other words, because it has no significant tasks to handle it is unnecessary, but it only serves as an additional profit to the company once it is purchased by the buyer.

Bloatware may also come especially in adware where a lot of extension applications are sometimes automatically installed after it is allowed to operate in just a click. The only solution for a bloatware is to uninstall it.  .
5 0
3 years ago
import java.io\.\*; import java.nio.file\.\*; public class TestFileReader { public static void main(String[] args) { Path p = Pa
Charra [1.4K]

Answer:

The delimiter use is "::".

Explanation:

The Java inbuilt String.split( ) function is use to split a String into an array of String.

The split( ) takes delimiter as arguments/parameter which determines at which point the string is to be broken down into different part/token.

From the above code snippet;

Each line in the file a.txt that is not null is splitted using the statement below:

String[ ] v = line.split("::");

The line is splitted using "::" as delimiter and the resulting array is then assigned to the variable 'v'.

For instance, a line in the file could take the form:

John::Smith::Music

When it is splitted,

String lname = John;

because lname make reference to index 0 of the array.

String fname = Smith;

because fname make reference to index 1 of the array.

String dept = Music;

and dept make reference to index 2 of the array.

6 0
3 years ago
Wat kind o mouse pleese hep meh​
Trava [24]

Answer:

It's is a razer Basilisk

4 0
3 years ago
In describing a new problem you are having with your computer, your boss interrupts and states, I had the same problem last week
Anna007 [38]

Answer:

Stereotyping

Explanation:

According to my research on information technology, I can say that based on the information provided within the question it can be said that your boss is exhibiting Stereotyping which could be inhibiting his creative problem-solving approach. Just like in psychology, stereotyping is over-generalized belief about a particular something. Which in this case since his boss saw a similarity in the problem with another problem he previously had, he automatically assumed he knew the cause and how to fix it.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Read 2 more answers
Other questions:
  • At regular intervals the AP in an infrastructure network or wireless device in an ad hoc network sends a ____ frame both to anno
    8·1 answer
  • What type of wireless connection requires an unobstructed "line of sight" between transmitter and receiver?
    8·1 answer
  • Assuming you have a TCF free student checking account, how many maximum overdraft fees can you incur in one day?
    12·1 answer
  • Which principle of design indicates that the elements that represent the same idea or category should be placed together
    8·2 answers
  • Just answer in five-line. Question:
    9·1 answer
  • Cnt115-02* which of the following is a private ip address and can't be routed across the internet?
    12·1 answer
  • The ____ attribute can be used only with input boxes that store text. Group of answer choices type pattern required value
    9·1 answer
  • Alvin has created a non-extensive site map of all the commonly visited pages of his website. What is such a site map called?
    13·1 answer
  • Questic
    8·1 answer
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!