Data validation is often a topic of great importance when it comes to databases.
Since information is constantly being updated, deleted, queried, or moved around, having valid data is a must.
You can use a similar validation for other protocols.
By default, database validation reports and releases only page structures.
To begin, create a tablespace and table by assigning it to that tablespace.
Then insert data in the table as follows: Bring the tablespace to the offline mode, and then corrupt the datafile using the manual corruption methods that is described in Chapter 4.
By using check logical syntax, we can check for logical corruptionas well.
Ignoring checksums allows successful validation of a corrupt database, but the affected data may be lost.This feature is explained in more detail in Chapter 4.It should be mentioned that by default, RMAN checks for physical corruption.The main types of constraints in SQL are check, unique, not null, and primary constraints.Check constraints are used to make certain that a statement about the data is true for all rows in a table.