An entire backup taken although the database is open is not consistent to the supplied place in time and must be recovered (with the online and archived redo log files) prior to the database may become available. As an example, key memory and cache memory are samples of risky storage. https://paulineh726has1.bcbloggers.com/profile