These methods can lead to software instability, security risks, and potential data loss.