Skip to main content

Codd's Rule- Fully relatoinal DBMS

CODD’s RULES
The founder of the relational data base theory Dr. E F Codd has outlined twelve rules (modified to 333 rules) to test whether a product that is claimed to be fully relational really is an RDBMS. The twelve rules are based on a single foundation principle which is called as rule zero.
RULE ZERO : For any system that is claimed to be RDBMS, that system must be able to manage databases entirely through its relational capabilities.
RULE ONE Information representation
All information in RDB is represented explicitly as values in tables.
[ The metadata i.e., table name, column name etc. should also be stored in tables]
RULE TWO Guaranteed access
Each and every data item (atomic values) in a relational data base is guaranteed to be logically accessible by giving the table name, primary key value and column name.
[This rule specifies the need for a primary key to access the data in the data base]
RULE THREE Systematic treatment of null values
Null values are supported for representing missing information and inapplicable information in a systematic way, independent of data type.
[The systematic, uniform representation means that only one technique can be used for dealing with null values]
RULE FOUR Dynamic online catalogue (Data dictionary) based on relational data model The data base description is represented at the logical level in the same way as ordinary data, so that authorized users can apply the same relational language to its interrogation as they apply to the regular data.
[Only one data model is used for data and metadata, and only one manipulation sublanguage is used for querying]

RULE FIVE Comprehensive Data Sublanguage
A relational system may support several languages and various models for terminal use. But these must be at least one language whose statements can express all of the following items:
1. Data Definitions, 2. View definitions, 3. Data Manipulation [interactive and by Program], 4. Integrity Constraints, 5. Authorization, 6. Transaction Boundaries [Begin, Commit and Roll back]
RULE SIX View updating
All views that are theoretically updateable are also updateable by system.
RULE SEVEN High level insert, update and delete
The capability of handling a base relation and a derived relation or view on a single operand applies not only to the retrieval of data but also to the insertion, updating and deletion of data.
[This means that all the operators are set operators, not records or tuple operators i.e., a set of rows can be deleted in one statement (in one command) or a set of rows can all be modified or inserted]
RULE EIGHT Physical Data Independence
Application programs and terminal activities remain logically unaffected whenever any changes are made in either storage representation and access methods.
RULE NINE Logical Data Independence
Application programs and terminal activities remain logically unimpaired when information preserving changes of any kind that theoretically permit unimpairement, are made to the base tables.
RULE TEN Integrity Independence
Integrity constraints specific to a particular data base must be definable in the relational sub language and storable in catalogue, not in the application program.
RULE ELEVEN Distribution Independence
The data manipulation sub language of a relational DBMS must enable application programs and queries to remain logically the same whether and whenever the data are physically centralized or distributed. [In a distributed data base data are physically dispersed (distributed) across several remote computer sites and data processing requests at any one of these sites may require data stored at several of the sites. Each program treats the data base as it were all local. So Distribution and redistribution do not change the logic of the program]
RULE TWELVE Non Subversion
If a relational system has a low level (single record at a time) language, that low level language cannot be used subvert or bypass the integrity rules and constraints expressed in the higher level relational language. (Multiple records at a time).
[This means that all DML supported by the DBMS must rely only on the stored data base definition, including integrity rules and security constraints for processing of data.]

Comments

Popular posts from this blog

Introduction to Data Structures

Visit My Data Structure Blog for Programs... It is important for every Computer Science student to understand the concept of Information and how it is organized or how it can be utilized. If we arrange some data in an appropriate sequence, then it forms a Structure and gives us a meaning. This meaning is called Information . A data structure is a particular way of storing and organizing data in a computer so that it can be used efficiently. Data may be organized in many different ways. The logical model of a particular organization of data in a computer is called data structure. The choice of the model based on two considerations. It should be reflect the data in the real world. It should be simple that one can effectively process the data when necessary. E.g. Array, linked list, stack, queue, tree, graph Data structure can be classified into two: Linear: A data structure is said to be linear if its elements form a sequence E.g. Array, linked list, stack, queue Non-Linear: A dat

Basic Linux Commands For Beginner's

Basic Linux Commands for Beginners Linux is an Operating System’s Kernel. You might have heard of UNIX. Well, Linux is a UNIX clone. But it was actually created by Linus Torvalds from Scratch. Linux is free and open-source, that means that you can simply change anything in Linux and redistribute it in your own name! There are several Linux Distributions, commonly called “distros”. A few of them are: Mint Ubuntu Linux Red Hat Enterprise Linux Debian Fedora Kali Linux is Mainly used in Servers. About 90% of the Internet is powered by Linux Servers. This is because Linux is fast, secure, and free! The main problem of using Windows Servers are their cost. This is solved by using Linux Servers. Forgot to mention, the OS that runs in about 80% of the Smartphones in the World, Android, is also made from the Linux Kernel. Yes, Linux is amazing! A simple example of its security is that most of the viruses in the world run on Windows, but not on Linux

KTU-FOSS LAB Solutions

Write shell scripts to show the following  ( you can write menu driven programs)  Currently logged user and his logname   ( logname, id -un, echo $USER)  Your current shell ( echo $SHELL)  Your home directory ( echo $HOME)  Your operating system type (echo $OSTYPE)  Your current path setting ( echo $PATH)  Your current working directory ( echo $PWD )  Show Currently logged  users ( w or who -H)      Show only the user name of logged users in the host ( users)      Details of last login ( last mec  ;where mec is the user id )  About your OS and version, release number, kernel version                                                 ( uname -a or  cat  /proc/version)  Show all available shells ( cat /etc/shells )  Show mouse settings (cat  /sys/class/input/mouse*/device/name )  Show computer CPU information       CPU details      ( cat /proc/cpuinfo | more )       Show information on  CPU architecture ( lscpu)       Number of Processo