
Photo by Todd Quackenbush on Unsplash
Part 1 of this two-part series, discussed the requirements for implementing data integrity checks using a TRIGGER
. With the success of that TRIGGER
, this second blog post will dive into its workings, gaining an understanding of how the checks are performed, along with the TRIGGER
itself.
Note: All data, names or naming found within the database presented in this post, are strictly used for practice, learning, instruction, and testing purposes. It by no means depicts actual data belonging to or being used by any party or organization.
I will be using Xubuntu Linux 16.04.3 LTS (Xenial Xerus) and MySQL 5.7.21 for these exercises.