1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
2 years ago
8

12. Your project specifications call for a business rule that the database design can't

Computers and Technology
1 answer:
fomenos2 years ago
8 0

A lot of business rules needs to be triggered so as to run.

In making of business rule, one can select triggers to run some specific events or run using some particular specified frequency.

The trigger options differs  based on the type of rule you are interested in.  One can also use multiple triggers when using a single rule.

Learn more about rules from.

brainly.com/question/5707732

You might be interested in
When creating a presentation you should use a blank as a starting point?
Lera25 [3.4K]
A blank presentation is recommended as the starting point when creating a PowerPoint presentation.  PowerPoint <span>lets you change the appearance, layout and content of your presentation at any time. Starting with a blank presentation lets you experiment more easily with the many features this program offers.</span>
6 0
3 years ago
Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party
Anarel [89]

Tracking protection internet explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications

The internet can be a dangerous place, and it's important to take steps to protect your privacy. One way to do this is to enable tracking protection in your web browser.

Tracking protection is a security feature that restricts the information that can be tracked by external websites and applications. This means that your browsing session will be more private, and your data will be less likely to be collected and used without your consent.

To enable tracking protection in Internet Explorer, go to the Tools menu and select Internet Options. On the Privacy tab, click the Tracking Protection button. You can then choose to enable tracking protection for all websites, or only for certain websites that you trust.

Enabling tracking protection can help to keep your data safe and your privacy protected. So if you're concerned about online privacy, be sure to enable this feature in your web browser.

Learn more on internet explorer here:

brainly.com/question/28431103

#SPJ4

6 0
1 year ago
Why shouldn't a server use a glass to scoop ice?
natali 33 [55]
A server shouldn't use a glass to scoop ice as the glass may break. This is due to the potential temperature difference between the glass (which may be room temperature or hotter if it is taken from a dishwasher), and the cold ice. Any existent hairline fractures in the glass may then expand and crack, whereby the smashed pieces of glass could then land in the client's food, table or lap, potentially causing injury to the person. 
7 0
3 years ago
Read 2 more answers
A python keyword______.
Cerrena [4.2K]

Answer:

cannot be used outside of its intented purpose

Explanation: python keywords are special reserved words that have specific meanings and purposes and can't be used for anything but those specific purposes

8 0
3 years ago
To decrease the size of text so it will fit into a text box without overflowing, select the
Trava [24]

Answer:

It is is A

Explanation:

Becuase if you shrink a text thats just the answer

5 0
3 years ago
Read 2 more answers
Other questions:
  • In the file MajorSalary, data have been collected from 111 College of Business graduates on their monthly starting salaries. The
    15·1 answer
  • Discuss the pros and cons of tombstoning versus multitasking. Why do you think Microsoft chose tombstoning?
    11·1 answer
  • Write a program to compute answers to some basic geometry formulas. The program prompts the user to input a length (in centimete
    7·1 answer
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • Create a program that generates a report that displays a list of students, classes they are enrolled in and the professor who te
    11·1 answer
  • How to format the selected range of cells as u.s currency
    6·1 answer
  • Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document .
    12·1 answer
  • Explain what an IM is, and what is the technology shown in the accompanying figure
    7·2 answers
  • Select the correct answer from the drop-down menu.
    15·2 answers
  • Write Epic username plz
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!