answersLogoWhite

0


Best Answer

÷Integrity constraints (e.g., account balance > 0) become "buried" in program code rather than being stated explicitly

÷Hard to add new constraints or change existing ones

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is integrity problems in file system?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How do you fix file integrity error?

How to Fix file integrity violated Error


When would it make sense not to use a database system?

It may not make sense to use a database system for simple, small-scale applications or projects that do not require complex data management or querying capabilities. Additionally, if the data storage and retrieval needs are minimal and can be efficiently managed using flat files or basic data structures, a database system may be unnecessary.


What is a reason to implement Kerberos over local system authentication?

Centralized file integrity protection!


What are the other parameters for the sfc command besides scannow?

Here are all the SFC commands according to Microsoft: /SCANNOW - This scans the integrity of all protected system files and repairs files with problems when possible. /VERIFYONLY - This scans integrity of all protected system files. However, no repair operation is performed. /SCANFILE - This scans integrity of the referenced file and repairs the file if problems are identified. Specify full path <file> /VERIFYFILE - This verifies the integrity of the file with full path <file>. However, no repair operation is performed. /OFFBOOTDIR - This is for offline repair. Specify the location of the offline boot directory /OFFWINDIR - This is for offline repair. Specify the location of the offline windows directory


What are dis advantage of file systems?

FPS is File processing system that was used earlier. There are certain limitation in FPS like no security, no integrity.


What is refs file system?

An ReFS is a resilient file system. The main function of an ReFS system is to maximize data availability. Some of the key features of an ReFS system include integrity, availability, scalibility, and app compatibility.


What is the difference between database and file system?

A database is a structured collection of data organized for efficient retrieval, storage, and manipulation, while a file system is a method used by operating systems to store, organize, and access files on a computer. Databases provide features like data integrity, relationships, and query capabilities, whereas file systems primarily focus on storing and managing individual files.


How do you check the integrity of an ISO file?

To check the integrity of the an ISO file you will need to open command prompt. Once in command prompt type in: c:\> fciv , and the iso file name.


Security problems in file processing system?

Enforcing Security Constraints in file processing system is very difficult as the application programs are added to the system in an ad-hoc manner.


A technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues Which Windows XP utility will check the file system for errors?

check disk, or chkdsk in the Run menu


How do you check integrity of a file you have downloaded?

You are not free to chose the method of integrity check, because file integrity checks are two-step processes: First, the original owner of a file computes an integrity fingerprint. An MD5 signature is a popular choice, but many other suitable methods are available an in use. The resulting signature is the communicated with you, often not as part of the file itself (embedding the signature requires additional steps to prevent someone from modifying the file and re-signing). Second, you receive file and integrity checksum. At this point, you have no choice regarding the integrity method; you must use whichever method the originator chose. The originator will typically be able to advise on freely available tools, or supply such a tool, to perform the integrity checks with the chosen algorithms and attributes.


How do you check the integrity of a file you have downloaded?

You are not free to chose the method of integrity check, because file integrity checks are two-step processes: First, the original owner of a file computes an integrity fingerprint. An MD5 signature is a popular choice, but many other suitable methods are available an in use. The resulting signature is the communicated with you, often not as part of the file itself (embedding the signature requires additional steps to prevent someone from modifying the file and re-signing). Second, you receive file and integrity checksum. At this point, you have no choice regarding the integrity method; you must use whichever method the originator chose. The originator will typically be able to advise on freely available tools, or supply such a tool, to perform the integrity checks with the chosen algorithms and attributes.