Codd's Rules
Also called Codd's Law, a set of 13 rules used to determine if a DBMS can be considered a relational DBMS (RDBMS). In 1985, Dr. E. F. Codd first published this list of rules that became a standard way of evaluating a relational system. The rules have since been expanded by others, and after publishing the original article Codd stated that there are no systems that will satisfy every rule. Following are Codd's original 13 rules:
- Often referred to as rule 0, this rule states that all subsequent rules are based on the notion that in order for a database to be considered relational, it must use its relational facilities exclusively to manage the database.
- 1. The Information rule: All information in an RDBMS is represented logically in just one way - by values in tables.
- 2. The Guaranteed Access rule: Each item of data in an RDBMS is guaranteed to be logically accessible by resorting to a combination of table name, primary key value, and column name.
- 3. The Systematic Treatment of Null Values rule: Null values (distinct from an empty character string or a string of blank characters and distinct from zero or any other number) are supported in a fully relational DBMS for representing missing information and inapplicable information in a systematic way, independent of the data type.
- 4. The Dynamic Online Catalog Based on the Relational Model rule: The database description is represented at the logical level in the same way as ordinary data, so that authorized users can apply the same relational language to its interrogation as they apply to the regular data.
- 5. The Comprehensive Data Sublanguage rule: A relational system may support several languages and various modes of terminal use (for example, the fill-in-blanks mode). However, there must be at least one language whose statements are expressible, per some well-defined syntax, as character strings and whose ability to support all of the following is comprehensible: data definition, view definition, data manipulation (interactive and by program), integrity constraints, and transaction boundaries (begin, commit, and rollback).
- 6. The View Updating rule: All views of the data which are theoretically updatable must be updatable in practice by the DBMS.
- 7. The High-level Insert, Update, and Delete rule: The capability of handling a base relation or a derived relation as a single operand applies not only to the retrieval of data but also to the insertion, update, and deletion of data.
- 8. The Physical Data Independence rule: Application programs and terminal activities remain logically unimpaired whenever any changes are made in either storage representations or access methods.
- 9. The Logical Data Independence rule: Application programs and terminal activities remain logically unimpaired when information preserving changes of any kind that theoretically permit unimpairment are made to the base tables.
- 10. The Integrity Independence rule: Integrity constraints must be definable in the RDBMS sub-language and stored in the system catalogue and not within individual application programs.
- 11. The Distribution Independence rule: An RDBMS has distribution independence. Distribution independence implies that users should not have to be aware of whether a database is distributed.
- 12. The Nonsubversion rule: If the database has any means of handling a single record at a time, that low-level language must not be able to subvert or avoid the integrity rules which are expressed in a higher-level language that handles multiple records at a time.
Featured Partners Sponsored
-
Citrix XenDesktop and Wyse Xenith:
Increase worker productivity, enhance data security, and enjoy greater energy savings. Find out how. Download the “Ultimate Desktop Simplicity Kit” now.» -
Read “10 Data Center Server Hardware Must-Haves” now:
Find out which 10 hardware additions will help you maintain excellent service and outstanding security for you and your customers. »
-
Read “3 Ways to Secure Your Virtualized Data Center” now:
Server virtualization is growing in popularity, but the technology for securing it lags. To protect your virtual network.» -
Read “Migrate to a Private Cloud, Not a Virtual Datacenter” now7:
Before you implement a private cloud, find out what you need to know about automated delivery, virtual sprawl, and more. »
-
1
private cloud project
Companies initiate private cloud projects to enable their IT infrastructure to become more capable of quickly adapting to continually evolving...
-
2
cloud backup
A cloud backup (cloud computer backup) refers to backing up data to a remote, cloud-based server. As a form of cloud storage, cloud backup data is...
-
3
mobile operating system
The mobile operating system is the software platform on top of which other programs, called application programs, can run on mobile devices.
-
4
big data
A catch-phrase, used to describe a massive volume of both structured and unstructured data that is so large that it's difficult to process with...
-
5
enterprise application
An enterprise application is the term used to describe applications -- or software -- that a business would use to assist the organization in...
-
6
private cloud
The phrase used to describe a cloud computing platform that is implemented within the corporate firewall, under the control of the IT department....
-
7
BYOD - bring your own device
A phrase that has become widely adopted to refer to mobile workers bringing their own mobile devices, such as smartphones, laptops and PDAs, into...
-
8
consumerization of IT
Consumerization of IT is a phrase used to describe the cycle of information technology (IT) emerging in the consumer market then spreading to...
-
9
CRM - Customer Relationship Management
Short for customer relationship management, CRM entails all aspects of interaction a company has with its customer, whether it be sales or service...
-
10
ERP - Enterprise Resource Planning
Short for enterprise resource planning, ERP is business management software that allows an organization to use a system of integrated applications...
Connect with Webopedia
-
Android Apps for Remote Computer Access
Remote access is useful when you need to collaborate with co-workers, help a friend with PC problems or grab files from your desktop.


