From the course: CompTIA Data Systems (DSO-001) Cert Prep
Unlock this course with a free trial
Join today to access over 24,000 courses taught by industry experts.
Data corruption checks
From the course: CompTIA Data Systems (DSO-001) Cert Prep
Data corruption checks
- When we have errors or inconsistencies in our data, we call that data corruption. Corruption can make our data either partially or entirely unusable. It can occur when reading, writing, storing, transmitting, or processing data, and it can happen because of all sorts of different reasons, power failures, hardware crashes, inconsistent network performance, and many other unwanted situations. People can also cause data corruption by accidentally altering configuration settings or removing data files. A checksum is a simple redundancy check for detecting data corruption. The process involves applying a checksum algorithm to an original data file that produces a single output called the checksum. It's common to use checksums when transmitting files between systems, as corruption exists if the checksum value of the original file doesn't match the checksum of the received file. For example, suppose you operate a data warehouse and receive a nightly load from a source system. If you…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Query optimization2m 11s
-
(Locked)
Index optimization2m 5s
-
(Locked)
Patch management1m 33s
-
(Locked)
Database integrity checks2m 38s
-
(Locked)
Data corruption checks2m 21s
-
(Locked)
Audit log review2m 6s
-
(Locked)
Performance tuning3m 23s
-
(Locked)
Load balancing2m 58s
-
(Locked)
Change management3m
-
(Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-