adplus-dvertising
frame-decoration

Question

____________ is a special type of stored procedure that is automatically invoked whenever the data in the table is modified.

a.

Procedure

b.

Trigger

c.

Curser

d.

None of the Mentioned

Posted under DBMS

Answer: (b).Trigger

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ____________ is a special type of stored procedure that is automatically invoked whenever the data in the table is modified.

Similar Questions

Discover Related MCQs

Q. ______________ requires that data should be made available to only authorized users.

Q. Some of the utilities of DBMS are _____________

i) Loading ii) Backup iii) File organization iv) Process Organization

Q. ____________ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement.

Q. Which is essential a business problem not a data problem:

Q. Which is primarily the result of a thorough understanding of information about an enterprise:

Q. McFadden has defined normalization in his which book___________

Q. The database design prevents some data from being represented due to _______

Q. How many types of insertion anomalies:

Q. Who developed the normalization process:

Q. E.F.Codd developed the normalization process in the which early:

Q. Which is the process of breaking a relation into multiple relations:

Q. Which formal method that locates and analyses relation schemas on the basis of their primary, candidate keys, and the FD’s that are present among the attributes of these schemas:

Q. Which is refers to a stalemate situation due to which no further progress is possible as computer await response of each other:

Q. Which is a duplicate copy of a file program that is stored on a different storage media than the original location:

Q. Which is duplication of computer operations and routine backups to combat any unforeseen problems:

Q. Optimization that is basically related to the rewriter module is termed as__________

Q. Optimization basically related to the Rewrite module is termed as_______

Q. Database security helps organizations to protect data from _____

Q. Copying files to secondary or specific devices is known as ______

Q. How many types of recovery control techniques: