Explain the disadvantages of using dbms, Database Management System

Assignment Help:

Explain the disadvantages of using DBMS

There could be a few disadvantages of using DBMS.

As DBMS requires computers, we have to invest a good amount in acquiring the hardware, software, installation facilities and training of users.

We have to keep regular backups because a failure can happen any time. Taking backup is a lengthy process and the computer system cannot perform any other job at this time.

Whereas data security system is a boon for using DBMS, it must be very robust. If someone can bypass the security system then the database would become open to any type of mishandling

 


Related Discussions:- Explain the disadvantages of using dbms

DISTIBUTED DATABASE, Define physical image of a global relation at a site

Define physical image of a global relation at a site

Define two-phase locking protocol, Define two-phase locking protocol. A...

Define two-phase locking protocol. Ans: Two-phase locking is significance in the context of ensuring that schedules are serializable. The two-phase locking protocol defines a p

What is a state chart diagram, What is a state chart diagram? State dia...

What is a state chart diagram? State diagrams (State Chart Diagram) explain all possible states that a particular object can get into, and how object's state changes as result

Define dbms, Define DBMS? DBMS: database management system (DBMS) is co...

Define DBMS? DBMS: database management system (DBMS) is computer software designed for the reason of supervision databases based on a variety of data models.

Purchase orber , Run the following queries. For each query show 1) What yo...

Run the following queries. For each query show 1) What you expect the output to be based upon the data 2) the SQL code and 3) the output running the query in Oracle. 1. Show all c

Types of online analytical processing tools, Describe the various types of ...

Describe the various types of Online Analytical Processing (OLAP) tools and briefly discuss how the support common analytical operations.

Security-data fragmentation, Security: Data not needed by local applicatio...

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

Linked list, what is difference between circular inked lust and grunded lin...

what is difference between circular inked lust and grunded linked list

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd