DML triggers are used to ________.

maliciously attack databases
produce automatic responses if the data of the database has been
altered
Both maliciously attack databases and produce automatic responses if
the data of the database has been altered
Neither maliciously attack databases nor produce automatic responses
if the data of the database has been altered


produce automatic responses if the data of the database has been
altered

Computer Science & Information Technology

You might also like to view...

Which of the following is FALSE about the Recycle Bin?

A) The Recycle Bin can be opened by double-clicking the shortcut on the desktop. B) A folder and all of the files can be restored. C) More than one file can be restored at the same time. D) If a folder is restored, the files within it are not restored.

Computer Science & Information Technology

You can apply master pages to document pages using the Apply Master to Pages command on the Pages Panel menu.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Charts provide an alternative view of the data entered into a form, and the chart's values are typically based on the values in an Access table

Indicate whether the statement is true or false

Computer Science & Information Technology

How does Word display words that are not found in its dictionary?

A) Red wavy line B) Double-strikethrough C) Blue wavy line D) Strikethrough

Computer Science & Information Technology