•Virtually all database management is carried out by client programs which pass instructions to the appropriate server. However
–In extremisthordump() will dump the contents of the *.DP file as tdt’s.
–As the tdt’s are ASCII characters the database content can be manipulated externally via editors and text utilities such as awk()and grep(), and the database rebuilt.
For example, thor_find_and_replace() replaces the entire content of a subtree.
–By tying identifiers to data, as in the thor model, the integrity
of the data is not compromised by a
updates and changes.