1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
riadik2000 [5.3K]
2 years ago
12

Which table cannot have a trigger associated with it in mysql

Computers and Technology
1 answer:
timofeeve [1]2 years ago
3 0

Answer:

MySQL triggers cannot:<u> Use SHOW , LOAD DATA , LOAD TABLE , BACKUP</u> DATABASE, RESTORE , FLUSH and RETURN statements. Use statements that commit or rollback implicitly or explicitly such as COMMIT , ROLLBACK , START TRANSACTION , LOCK/UNLOCK TABLES , ALTER , CREATE , DROP , RENAME.

Explanation:

hope it helps

mark me brainliest pls

You might be interested in
Why is it important to explore an Integrated
dezoksy [38]

Answer:

The answer to this question is given below in the explanation section. The correct answer is B.

Explanation:

The purpose behind to explore an integrated development environment is to learn more about the features of the environment.

So the correct answer is B.

For example, you can use visual studio to build asp.net application using c#, then you need to explore what features visual studio offering to you.

However, other options are incorrect. Because, you can learn more about syntax, error handling, and abstraction in the programming language, not in the IDE.

6 0
3 years ago
I need help ASAP Please! :)
amid [387]
Your parents,your school,google,your social media accounts
3 0
3 years ago
What are two best practices for creating ads? (Choose two.) Select All Correct Responses Implement one ad per ad group per keywo
salantis [7]

The two best practices for creating ads are:

  • Include three to five ads and at least three extensions in each ad group.
  • Optimize the campaign’s ad rotation for clicks or conversion actions.

<h3>How do one Create one responsive search ad per ad group?</h3>

In any ad group, one need to have at least a single responsive search ad.

Note that this will help to optimize one's performance, and as such, the two best practices for creating ads are:

  • Include three to five ads and at least three extensions in each ad group.
  • Optimize the campaign’s ad rotation for clicks or conversion actions.

Learn more about ads from

brainly.com/question/1658517

#SPJ1

5 0
2 years ago
Images are available in many formats, such as tif, bmp, gif, jpeg, and ____.
Lerok [7]
<span>Images are available in many formats, such as tif, bmp, gif, jpeg, and png.

</span>Hope that helps.
7 0
3 years ago
In computer science what are the methods used to protect the information stored by a piece of software called?
Nezavi [6.7K]

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

3 0
3 years ago
Other questions:
  • How can I use the internet/social media to protect my identity?
    14·1 answer
  • The Change Speed command in Audacity lets you change which two things about a track at the same time?
    9·1 answer
  • What is an example of a governmental influence ?
    9·2 answers
  • For an machine using 2-dimensional even parity for error detection/correction, and the following received bytes, where is the er
    9·1 answer
  • Yuri, a medical assistant, has been asked to send an account of a patient's last office visit to another doctor's office. The te
    6·2 answers
  • Select the correct answer.
    7·2 answers
  • How do you answer a question that's already been answered?
    5·1 answer
  • What is the missing line of code? &gt;&gt;&gt; &gt;&gt;&gt; math.sqrt(16) 4.0 &gt;&gt;&gt; math.ceil(5.20) 6
    14·2 answers
  • Assume there is a 30-byte heap. The free list for this heap has two elements on it. One entry describes the first 10-byte free s
    15·1 answer
  • 2. what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each on
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!