Use triggers to maintain referential integrity, PL-S, Basic Computer Science

Assignment Help:
At times, Brewbean''s has changed the id number for existing products. In the past, they have had to add a new product row with the new id to the BB_PRODUCT table, modify all the corresponding BB_BASKETITEM and BB_PRODUCTOPTION table rows, and then delete the original product row. Can a trigger be developed to avoid all these steps and handle the update of the BB_BASKETITEM and BB_PRODUCT OPTION table rows automatically for a given change in product id? If so, create the trigger and test by issuing an update statement, which changes the IDPRODUCT of 7 to 22. Do a rollback to return the data back to its original state. Also, disable the new trigger after you have completed the assignment.

Related Discussions:- Use triggers to maintain referential integrity, PL-S

Library function, Library function :   These are the functions supplied...

Library function :   These are the functions supplied with the programming language. The code or definition of library functions does not have to be written in a user program w

Explain uses of system call and its major types, In computing, a system cal...

In computing, a system call is how a program asks for a service from an operating system''s kernel. This may contain hardware related services (for example accessing the hard disk)

Cathode ray tube monitors, Cathode Ray Tube Monitors (CRT): Monitors d...

Cathode Ray Tube Monitors (CRT): Monitors display what is going on in your computer. They can run at various resolutions. It is the part of computer which looks like a TV set.

Stack instructions, These instructions permit the use of the stack to store...

These instructions permit the use of the stack to store or recover data. POP POPF PUSH PUSHF POP INSTRUCTION Purpose: It improves a portion of information from the stack POPF INST

OPERATING SYSTEM, WHAT IS MULTIPLE CONTIGUOUS VARIABLE PARTITIONING

WHAT IS MULTIPLE CONTIGUOUS VARIABLE PARTITIONING

Completeness in search - artificial intelligence, Completeness in search - ...

Completeness in search - artificial intelligence: It's also importance trying to calculate the number of solutions to a problem, and the density of those solutions amongst the

Security threats on internet, Security threats on internet:  The Inter...

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

Algorithm - programming language, Algorithm : Once a problem has been defi...

Algorithm : Once a problem has been defined precisely, a procedure or process must be designed to produce the required output from the given input. Since a computer is a machine t

Specify the steps to creating a powerpoint presentation, FUNDAMENTALS OF CO...

FUNDAMENTALS OF COMPUTERS 1. Describe the importance of video in multimedia. What are some of the tips to keep in mind while making video for the web? 2. Specify the steps t

Network, Give a topology (network diagram) in which there is a link whose f...

Give a topology (network diagram) in which there is a link whose failure will change many routes. Give one in which there is a link whose failure will not change any routes

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd