answersLogoWhite

0

÷Integrity constraints (e.g., account balance > 0) become "buried" in program code rather than being stated explicitly

÷Hard to add new constraints or change existing ones

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

Purpose of the Chkdsk?

Chkdsk (Check Disk) is a utility in Windows that is used to check the integrity of the file system and file system errors on a disk. It helps to diagnose and repair disk-related problems to ensure the system runs smoothly and to prevent data loss due to disk errors.


How do you fix file integrity error?

How to Fix file integrity violated Error


What are the other parameters for the sfc command besides scannow?

Here are all the SFC commands according to Microsoft: /SCANNOW - This scans the integrity of all protected system files and repairs files with problems when possible. /VERIFYONLY - This scans integrity of all protected system files. However, no repair operation is performed. /SCANFILE - This scans integrity of the referenced file and repairs the file if problems are identified. Specify full path <file> /VERIFYFILE - This verifies the integrity of the file with full path <file>. However, no repair operation is performed. /OFFBOOTDIR - This is for offline repair. Specify the location of the offline boot directory /OFFWINDIR - This is for offline repair. Specify the location of the offline windows directory


What is a reason to implement Kerberos over local system authentication?

Centralized file integrity protection!


What are dis advantage of file systems?

FPS is File processing system that was used earlier. There are certain limitation in FPS like no security, no integrity.


What is refs file system?

An ReFS is a resilient file system. The main function of an ReFS system is to maximize data availability. Some of the key features of an ReFS system include integrity, availability, scalibility, and app compatibility.


What is the difference between database and file system?

In File System, files are used to store data while, collections of databases are utilized for the storage of data in DBMS. Although File System and DBMS are two ways of managing data, DBMS clearly has many advantages over File Systems. Typically when using a File System, most tasks such as storage, retrieval and search are done manually and it is quite tedious whereas a DBMS will provide automated methods to complete these tasks. Because of this reason, using a File System will lead to problems like data integrity, data inconsistency and data security, but these problems could be avoided by using a DBMS. Unlike File System, DBMS are efficient because reading line by line is not required and certain control mechanisms are in place.


Security problems in file processing system?

Enforcing Security Constraints in file processing system is very difficult as the application programs are added to the system in an ad-hoc manner.


What are the properties that include system file properties?

System file properties can include attributes such as read-only, hidden, system, and archive. These properties determine how the file behaves within the operating system and how it can be accessed or modified by users or applications. Understanding and managing these properties are essential for maintaining the integrity and security of system files.


How do you check the integrity of an ISO file?

To check the integrity of the an ISO file you will need to open command prompt. Once in command prompt type in: c:\> fciv , and the iso file name.


A technician thinks that the file system on a computer has a problem because Windows XP is reporting data integrity issues Which Windows XP utility will check the file system for errors?

check disk, or chkdsk in the Run menu


How do you remove a file with the name '-something'?

The same way you would remove any other named file. The only problems would arise if it was some how a system file.