Nota
L-aċċess għal din il-paġna jeħtieġ l-awtorizzazzjoni. Tista’ tipprova tidħol jew tibdel id-direttorji.
L-aċċess għal din il-paġna jeħtieġ l-awtorizzazzjoni. Tista’ tipprova tibdel id-direttorji.
This section explains the factors to consider when designing a DML trigger.
| Topic | Description |
|---|---|
Explains the different ways AFTER triggers and INSTEAD OF triggers can be designed. |
|
Provides examples to illustrate the differences in firing behavior between AFTER and INSTEAD OF triggers. |
|
Explains how AFTER and INSTEAD OF triggers execute once they fire. |
|
Explains design guidelines unique to INSTEAD OF triggers. |
|
Explains how trigger code can run under escalated privileges and how to mitigate this threat. |