From the course: CompTIA Data Systems (DSO-001) Cert Prep

Unlock this course with a free trial

Join today to access over 24,000 courses taught by industry experts.

Data corruption checks

Data corruption checks

- When we have errors or inconsistencies in our data, we call that data corruption. Corruption can make our data either partially or entirely unusable. It can occur when reading, writing, storing, transmitting, or processing data, and it can happen because of all sorts of different reasons, power failures, hardware crashes, inconsistent network performance, and many other unwanted situations. People can also cause data corruption by accidentally altering configuration settings or removing data files. A checksum is a simple redundancy check for detecting data corruption. The process involves applying a checksum algorithm to an original data file that produces a single output called the checksum. It's common to use checksums when transmitting files between systems, as corruption exists if the checksum value of the original file doesn't match the checksum of the received file. For example, suppose you operate a data warehouse and receive a nightly load from a source system. If you…

Contents