- Scan Question
- + Post
- Get Coins
Which of the options below accurately reflect the difference of setting a trigger to go off BEFORE as opposed to AFTER an event? Select all that apply.
Hint: You want want to read up the details of triggers on the mysql.dev website before answering.
A BEFORE trigger has access to the NEW keyword but not the OLD keyword, while an AFTER trigger has access to the OLD keyword but not the NEW keyword.
A BEFORE trigger can change values that are about to be updated or inserted to ensure data integrity.
An AFTER trigger can be used to change data that has just been updated or inserted to ensure data integrity.
If the only two triggers on a table are a BEFORE INSERT and an AFTER INSERT trigger, the BEFORE trigger always gets set off when data is inserted but the AFTER trigger only activates if the insertion actually succeeds.
None of the above.
BEFORE trigger has access to the NEW keyword but not the OLD keyword, while an AFTER trigger has access to the OLD keyword but not the NEW keyword.
(this is true because BEFORE trigger can access the new values before they go into the table by using the NEW keyword but not the old values and AFTER trigger can access the old values which are already there in the table using OLD keyword but not the new values)
A BEFORE trigger can change values that are about to be updated or inserted to ensure data integrity
(true because Before triggers are used to update or change values before they're saved in the tables)
An AFTER trigger can be used to change data that has just been updated or inserted to ensure data integrity
( true because AFTER triggers are used to update or change data that are saved in the databases)
4) if the only two triggers on a table are a BEFORE INSERT and an AFTER INSERT trigger, the BEFORE trigger always gets set off when data is inserted but the AFTER trigger only activates if the insertion actually succeeds
(true because before trigger works before insertion but when insertion it sets off and after insertion after trigger activates)
Which of the options below accurately reflect the difference of setting a trigger to go off...
1. This trigger is from Figure 16.2 of the text. Copy and run this trigger so it is created in the ap database. You can run the UPDATE below to test it. Notice two things. The error message appears as a pink screen just like a syntax error would. Also, if you then query the invoices table, the UPDATE statement did not execute. The trigger prevented the erroneous UPDATE from changing the data. DELIMITER // CREATE TRIGGER invoices_before_update BEFORE UPDATE...
DirectionsPerform the tasks below by using the correct SQL statements. You must create the statements in Oracle by using the following steps (SQL > SQL commands > EnterCommand). Once your command is error-free, copy and paste your statements into the assignment document. Upload this Word document for grading.Scenario:The suppliers want access to our database to enter their own prices. Although they are worried that other suppliers can see their prices, we have assured them thatthis is not possible.Complete the following...
14) Which of the following statements about life income settlement options is (are) true?I. Under a joint-and-survivor life income option, payments cease at the death of the second (last) surviving) annuitant,II. Under a life income with guaranteed period, a contingent beneficiary is guaranteed a minimum number of payments regardless of when the primary beneficiary dies.A) I onlyB) II onlyC) both I and II]D) neither I nor II15) Bruce left a question about heart disease blank on his life insurance application...
Overview This lab provides you the opportunity to insert and update data with the use of SQL commands. The lab will utilize the FLIX2YOU problem, the current schema. In order to start this lab, you must have successfully completed Lab # 6. In Lab # 6, you executed a script that was provided to you. This script created 7 of the FLIX2YOU tables as documented in the Entity Relationship Diagram in the FLIX2YOU problem document. The second part of lab...
PYTHON. Continues off another code(other code is below). I don't understand this. Someone please help! Comment the lines please so I can understand. There are short and med files lengths for each the list of names/ids and then search id file. These are the input files: https://codeshare.io/aVQd46 https://codeshare.io/5M3XnR https://codeshare.io/2W684E https://codeshare.io/5RJwZ4 LinkedList ADT to store student records(code is below). Using LinkedList ADT instead of the Python List. You will need to use the Student ADT(code is below) Imports the Student class...
Case 2.2-Baskin-Robbins: Can It Bask in the Good 'Ole Days? QUESTIONS ARE AT THE BOTTOM CASE: BASKIN-ROBBINS Can it bask in the good ‘ole days? It was early December 2003, and Baskin-Robbins Brand Officer Ken Kimmel had just returned from lunch. To his surprise, his walk from the parking lot to the Randolph, MA headquarters building had quickly turned into a sprint. Kimmel was trying to avoid the chilly effects of a Nor’easter that was whipping most of New England...
12. You are called by a department manager who wants one of his employees to have access to a specific document in the manager’s home directory. The department manager wants to retain the file in his own home directory, rather than move it to a share. You successfully assign the correct NTFS rights to the employee who needs to access the file, but when the employee attempts to access the file he fails. You instruct the user to log off...
The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...
Multiple Choice Multiple Choice Section 4.1 Pointers and Dynamic Memory Consider the following statements: int *p; int i; int k; i = 42; k = i; p = &i; After these statements, which of the following statements will change the value of i to 75? A. k = 75; B. *k = 75; C. p = 75; D. *p = 75; E. Two or more of the answers will change i to 75. Consider the following statements: int i =...