List-I | List-II |
(A) Controlled Data Sharing | (I) Same data maintained in different places does not match |
(B) Data Isolation | (II) Limited Access given to users |
(C) Data Dependence | (III) There is no mapping between two files |
(D) Data Inconsistency | (IV) If the structure of a file is changed, all the existing programs accessing that file also need to be changed |