- Controlling Redundancy.
- Restricting Unauthorized Access(security).
- Good GUI.
- Enforcing Integrity Constraints.
- Providing Backup and Recovery.
- Efficient Data Access.
- Application Development made easier.
- Flexibility.
- Reduced Application Development Time.
No comments:
Post a Comment