SlideShare a Scribd company logo
What are the Codd’s Rules?
What are the Codd’s Rules?
These guidelines can be applied on information source program that
manages saved information using only its relational abilities. This is a
basis concept, which acts as a base for all the other guidelines.
Rule 1: Information Rule
The information saved in a knowledge base, may it be customer
information or meta-data, must be a value of some desk cell. Everything
in a knowledge base must be saved in a desk format.
Rule 2: Assured Accessibility Rule
Every individual information element (value) is going to be accessible
rationally with a combination of table-name, primary-key (row value), and
attribute-name (column value). No other indicates, such as pointers, can
be used to get access information.
Rule 3: Methodical Therapy of NULL Values
The NULL principles in a knowledge source must
be given a thorough and uniform treatment. This is
a very important concept because a NULL can be
considered as one the following − information is
missing, information is not known, or information
is not applicable.
Rule 4: Active On the internet Catalog
The framework description of the entire
information source must be saved in an internet
based collection, known as information
vocabulary, which can be utilized by authorized
Rule 5: Comprehensive Data Sub-Language Rule
A data base can only be utilized using a
terminology having straight line format that
supports information definition, information
adjustment, and transaction management
functions. This terminology can be used directly or
through some program. If the information source
allows access information without any help of this
terminology, then it is considered as a violation.
Rule 6: Perspective Upgrading Rule
All the views of a knowledge source, which can
hypothetically be updated, must also be updatable
Rule 7: High-Level Insert, Update, and Remove
Rule
An information source must assistance high-level
placement, updation, and removal. This must not
be limited to a individual row, that is, it must also
assistance union, junction and less functions to
generate sets of information information.
Rule 8: Actual Data Independence
The information saved in a knowledge source
must be in addition to the programs that connect
to the information source. Any alternation in the
physique of a knowledge source must not have
Rule 9: Sensible Data Independence
The logical information in a knowledge source
must be separate of its user’s view (application).
Any alternation in logical information must not
affect the programs using it. For example, if two
platforms are combined or one is split into two
different platforms, there should be no effect or
modify on the consumer program. This is one of
the most difficult concept to apply.
Rule 10: Reliability Independence
An information source must be in addition to the
program that uses it. All its integrity restrictions
Rule 11: Submission Independence
The end-user must not be able to see that the
information is allocated over various locations.
Users should always get the impression that the
information is located at one site only. This
concept has been regarded as the basis of
allocated information source systems.
Rule 12: Non-Subversion Rule
If a program has an customer interface that
provides access low-level information, then the
consumer interface must not be able to subvert
the program and bypass security and integrity

More Related Content

What's hot (18)

Codds rules & keys
Codds rules & keysCodds rules & keys
Codds rules & keys
 
Data Abstraction
Data AbstractionData Abstraction
Data Abstraction
 
Rdbms
RdbmsRdbms
Rdbms
 
RDBMS.
RDBMS.RDBMS.
RDBMS.
 
Database model BY ME
Database model BY MEDatabase model BY ME
Database model BY ME
 
Degrees of data abstraction
Degrees of data abstractionDegrees of data abstraction
Degrees of data abstraction
 
Introduction to Data Abstraction
Introduction to Data AbstractionIntroduction to Data Abstraction
Introduction to Data Abstraction
 
Schema
SchemaSchema
Schema
 
Database model
Database modelDatabase model
Database model
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management System
 
Database language
Database languageDatabase language
Database language
 
The Object Oriented Database System Manifesto
The Object Oriented Database System ManifestoThe Object Oriented Database System Manifesto
The Object Oriented Database System Manifesto
 
3 Level Architecture
3 Level Architecture3 Level Architecture
3 Level Architecture
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
Introduction to DBMS(For College Seminars)
Introduction to DBMS(For College Seminars)Introduction to DBMS(For College Seminars)
Introduction to DBMS(For College Seminars)
 
Object Relational Database Management System(ORDBMS)
Object Relational Database Management System(ORDBMS)Object Relational Database Management System(ORDBMS)
Object Relational Database Management System(ORDBMS)
 
Database Concepts
Database ConceptsDatabase Concepts
Database Concepts
 
Design approach
Design approachDesign approach
Design approach
 

Similar to Codd rules

Coddrules 120309094848-phpapp02
Coddrules 120309094848-phpapp02Coddrules 120309094848-phpapp02
Coddrules 120309094848-phpapp02dhruv patel
 
Coddrules 120309094807-phpapp01
Coddrules 120309094807-phpapp01Coddrules 120309094807-phpapp01
Coddrules 120309094807-phpapp01dhruv patel
 
Software engineering Questions and Answers
Software engineering Questions and AnswersSoftware engineering Questions and Answers
Software engineering Questions and AnswersBala Ganesh
 
Geoscientific Data Management Principles
Geoscientific Data Management PrinciplesGeoscientific Data Management Principles
Geoscientific Data Management PrinciplesNigelLaubsch
 
242714436-Organizational-Security-Policies.pptx
242714436-Organizational-Security-Policies.pptx242714436-Organizational-Security-Policies.pptx
242714436-Organizational-Security-Policies.pptxssuser6c814f
 
Week 2 Characteristics & Benefits of a Database & Types of Data Models
Week 2 Characteristics & Benefits of a Database & Types of Data ModelsWeek 2 Characteristics & Benefits of a Database & Types of Data Models
Week 2 Characteristics & Benefits of a Database & Types of Data Modelsoudesign
 
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTAUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTEditor IJCATR
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access controlJyotishkar Dey
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...IRJET Journal
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 
Enterprise Information Architecture Using Data Mining
Enterprise Information Architecture Using Data MiningEnterprise Information Architecture Using Data Mining
Enterprise Information Architecture Using Data Miningcshamik
 
online patient treatment system
online patient treatment system online patient treatment system
online patient treatment system RabiaNasir31
 
FEASIBILITY ANALYSIS REPORT
FEASIBILITY ANALYSIS REPORTFEASIBILITY ANALYSIS REPORT
FEASIBILITY ANALYSIS REPORTrabianasir8
 

Similar to Codd rules (20)

Unit iii dbms
Unit iii dbmsUnit iii dbms
Unit iii dbms
 
Codd rules
Codd rulesCodd rules
Codd rules
 
Coddrules 120309094848-phpapp02
Coddrules 120309094848-phpapp02Coddrules 120309094848-phpapp02
Coddrules 120309094848-phpapp02
 
Coddrules 120309094807-phpapp01
Coddrules 120309094807-phpapp01Coddrules 120309094807-phpapp01
Coddrules 120309094807-phpapp01
 
Software engineering Questions and Answers
Software engineering Questions and AnswersSoftware engineering Questions and Answers
Software engineering Questions and Answers
 
Geoscientific Data Management Principles
Geoscientific Data Management PrinciplesGeoscientific Data Management Principles
Geoscientific Data Management Principles
 
242714436-Organizational-Security-Policies.pptx
242714436-Organizational-Security-Policies.pptx242714436-Organizational-Security-Policies.pptx
242714436-Organizational-Security-Policies.pptx
 
Week 2 Characteristics & Benefits of a Database & Types of Data Models
Week 2 Characteristics & Benefits of a Database & Types of Data ModelsWeek 2 Characteristics & Benefits of a Database & Types of Data Models
Week 2 Characteristics & Benefits of a Database & Types of Data Models
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Active database system
Active database systemActive database system
Active database system
 
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTAUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
Database security
Database securityDatabase security
Database security
 
database ppt(2)
database ppt(2)database ppt(2)
database ppt(2)
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
Enterprise Information Architecture Using Data Mining
Enterprise Information Architecture Using Data MiningEnterprise Information Architecture Using Data Mining
Enterprise Information Architecture Using Data Mining
 
online patient treatment system
online patient treatment system online patient treatment system
online patient treatment system
 
FEASIBILITY ANALYSIS REPORT
FEASIBILITY ANALYSIS REPORTFEASIBILITY ANALYSIS REPORT
FEASIBILITY ANALYSIS REPORT
 

More from raima sen

Dbms architecture
Dbms architectureDbms architecture
Dbms architectureraima sen
 
You will get DBA Jobs If You Learn What is Storage System, Hurry Up!
You will get DBA Jobs If You Learn What is Storage System, Hurry Up!You will get DBA Jobs If You Learn What is Storage System, Hurry Up!
You will get DBA Jobs If You Learn What is Storage System, Hurry Up!raima sen
 
Oracle certification-courses
Oracle certification-coursesOracle certification-courses
Oracle certification-coursesraima sen
 
Oracle jobs-for-freshers-now
Oracle jobs-for-freshers-nowOracle jobs-for-freshers-now
Oracle jobs-for-freshers-nowraima sen
 
Oracle database-certified
Oracle database-certifiedOracle database-certified
Oracle database-certifiedraima sen
 
Why To Use Data Partitioning?
Why To Use Data Partitioning?Why To Use Data Partitioning?
Why To Use Data Partitioning?raima sen
 
Query optimization-with-sql
Query optimization-with-sqlQuery optimization-with-sql
Query optimization-with-sqlraima sen
 
Index organized-table
Index organized-tableIndex organized-table
Index organized-tableraima sen
 
Increase database-performance
Increase database-performanceIncrease database-performance
Increase database-performanceraima sen
 
Oracle dba-daily-operations
Oracle dba-daily-operationsOracle dba-daily-operations
Oracle dba-daily-operationsraima sen
 
Data pump-export-examples
Data pump-export-examplesData pump-export-examples
Data pump-export-examplesraima sen
 
Restoration and-concurrency-database
Restoration and-concurrency-databaseRestoration and-concurrency-database
Restoration and-concurrency-databaseraima sen
 
On page-techniques
On page-techniquesOn page-techniques
On page-techniquesraima sen
 

More from raima sen (13)

Dbms architecture
Dbms architectureDbms architecture
Dbms architecture
 
You will get DBA Jobs If You Learn What is Storage System, Hurry Up!
You will get DBA Jobs If You Learn What is Storage System, Hurry Up!You will get DBA Jobs If You Learn What is Storage System, Hurry Up!
You will get DBA Jobs If You Learn What is Storage System, Hurry Up!
 
Oracle certification-courses
Oracle certification-coursesOracle certification-courses
Oracle certification-courses
 
Oracle jobs-for-freshers-now
Oracle jobs-for-freshers-nowOracle jobs-for-freshers-now
Oracle jobs-for-freshers-now
 
Oracle database-certified
Oracle database-certifiedOracle database-certified
Oracle database-certified
 
Why To Use Data Partitioning?
Why To Use Data Partitioning?Why To Use Data Partitioning?
Why To Use Data Partitioning?
 
Query optimization-with-sql
Query optimization-with-sqlQuery optimization-with-sql
Query optimization-with-sql
 
Index organized-table
Index organized-tableIndex organized-table
Index organized-table
 
Increase database-performance
Increase database-performanceIncrease database-performance
Increase database-performance
 
Oracle dba-daily-operations
Oracle dba-daily-operationsOracle dba-daily-operations
Oracle dba-daily-operations
 
Data pump-export-examples
Data pump-export-examplesData pump-export-examples
Data pump-export-examples
 
Restoration and-concurrency-database
Restoration and-concurrency-databaseRestoration and-concurrency-database
Restoration and-concurrency-database
 
On page-techniques
On page-techniquesOn page-techniques
On page-techniques
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxJisc
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfYibeltalNibretu
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chipsGeoBlogs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfkaushalkr1407
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 

Recently uploaded (20)

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

Codd rules

  • 1. What are the Codd’s Rules? What are the Codd’s Rules? These guidelines can be applied on information source program that manages saved information using only its relational abilities. This is a basis concept, which acts as a base for all the other guidelines. Rule 1: Information Rule The information saved in a knowledge base, may it be customer information or meta-data, must be a value of some desk cell. Everything in a knowledge base must be saved in a desk format. Rule 2: Assured Accessibility Rule Every individual information element (value) is going to be accessible rationally with a combination of table-name, primary-key (row value), and attribute-name (column value). No other indicates, such as pointers, can be used to get access information.
  • 2. Rule 3: Methodical Therapy of NULL Values The NULL principles in a knowledge source must be given a thorough and uniform treatment. This is a very important concept because a NULL can be considered as one the following − information is missing, information is not known, or information is not applicable. Rule 4: Active On the internet Catalog The framework description of the entire information source must be saved in an internet based collection, known as information vocabulary, which can be utilized by authorized
  • 3. Rule 5: Comprehensive Data Sub-Language Rule A data base can only be utilized using a terminology having straight line format that supports information definition, information adjustment, and transaction management functions. This terminology can be used directly or through some program. If the information source allows access information without any help of this terminology, then it is considered as a violation. Rule 6: Perspective Upgrading Rule All the views of a knowledge source, which can hypothetically be updated, must also be updatable
  • 4. Rule 7: High-Level Insert, Update, and Remove Rule An information source must assistance high-level placement, updation, and removal. This must not be limited to a individual row, that is, it must also assistance union, junction and less functions to generate sets of information information. Rule 8: Actual Data Independence The information saved in a knowledge source must be in addition to the programs that connect to the information source. Any alternation in the physique of a knowledge source must not have
  • 5. Rule 9: Sensible Data Independence The logical information in a knowledge source must be separate of its user’s view (application). Any alternation in logical information must not affect the programs using it. For example, if two platforms are combined or one is split into two different platforms, there should be no effect or modify on the consumer program. This is one of the most difficult concept to apply. Rule 10: Reliability Independence An information source must be in addition to the program that uses it. All its integrity restrictions
  • 6. Rule 11: Submission Independence The end-user must not be able to see that the information is allocated over various locations. Users should always get the impression that the information is located at one site only. This concept has been regarded as the basis of allocated information source systems. Rule 12: Non-Subversion Rule If a program has an customer interface that provides access low-level information, then the consumer interface must not be able to subvert the program and bypass security and integrity