DML triggers are used to ________.

maliciously attack databases

produce automatic responses if the structure of the database has been altered
Both maliciously attack databases and produce automatic responses if the structure of the database has been altered
 
Neither maliciously attack databases nor produce automatic responses if the structure of the database has been altered


Neither maliciously attack databases nor produce automatic responses if the structure of the database has been altered

Computer Science & Information Technology

You might also like to view...

Defining your database as a table, follow additional advantage(s) is (are) supported:

a. Auto Filter is turned on automatically. b. You can easily apply a large inventory of formats to your database. c. As you scroll down a table with many records, its headings remain visible onscreen. d. All of the others e. You are enabled to install a Total row.

Computer Science & Information Technology

?A(n) ____ reference identifies a cell by its location in relation to other cells and changes when a formula is moved or copied.

A. ?absolute B. ?relative C. ?template D. ?vector

Computer Science & Information Technology

With virtualization, a(n) _______________ operating system is physically installed on a machine.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The term "kernel" is often used when discussing Linux because technically, Linus is only the core of the OS.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology