Redundancy
Inconsistency
Isolation
Atomicity
Concurrent Access Anomalies
Difficulty in accessing Data Security
Last updated 1 year ago