Also called Codd's Law, a set of 13 rules used to determine if a DBMS can be considered a relational DBMS (RDBMS). In 1985, Dr. E. F. Codd first published this list of rules that became a standard way of evaluating a relational system. The rules have since been expanded by others, and after publishing the original article Codd stated that there are no systems that will satisfy every rule. Following are Codd's original 13 rules:
- Often referred to as rule 0, this rule states that all subsequent rules are based on the notion that in order for a database to be considered relational, it must use its relational facilities exclusively to manage the database.
- 1. The Information rule: All information in an RDBMS is represented logically in just one way - by values in tables.
- 2. The Guaranteed Access rule: Each item of data in an RDBMS is guaranteed to be logically accessible by resorting to a combination of table name, primary key value, and column name.
- 3. The Systematic Treatment of Null Values rule: Null values (distinct from an empty character string or a string of blank characters and distinct from zero or any other number) are supported in a fully relational DBMS for representing missing information and inapplicable information in a systematic way, independent of the data type.
- 4. The Dynamic Online Catalog Based on the Relational Model rule: The database description is represented at the logical level in the same way as ordinary data, so that authorized users can apply the same relational language to its interrogation as they apply to the regular data.
- 5. The Comprehensive Data Sublanguage rule: A relational system may support several languages and various modes of terminal use (for example, the fill-in-blanks mode). However, there must be at least one language whose statements are expressible, per some well-defined syntax, as character strings and whose ability to support all of the following is comprehensible: data definition, view definition, data manipulation (interactive and by program), integrity constraints, and transaction boundaries (begin, commit, and rollback).
- 6. The View Updating rule: All views of the data which are theoretically updatable must be updatable in practice by the DBMS.
- 7. The High-level Insert, Update, and Delete rule: The capability of handling a base relation or a derived relation as a single operand applies not only to the retrieval of data but also to the insertion, update, and deletion of data.
- 8. The Physical Data Independence rule: Application programs and terminal activities remain logically unimpaired whenever any changes are made in either storage representations or access methods.
- 9. The Logical Data Independence rule: Application programs and terminal activities remain logically unimpaired when information preserving changes of any kind that theoretically permit unimpairment are made to the base tables.
- 10. The Integrity Independence rule: Integrity constraints must be definable in the RDBMS sub-language and stored in the system catalogue and not within individual application programs.
- 11. The Distribution Independence rule: An RDBMS has distribution independence. Distribution independence implies that users should not have to be aware of whether a database is distributed.
- 12. The Nonsubversion rule: If the database has any means of handling a single record at a time, that low-level language must not be able to subvert or avoid the integrity rules which are expressed in a higher-level language that handles multiple records at a time.
Google's project program for developing a line of hands-free, head-mounted intelligent devices that can be worn by users as eyewear.
Short for enterprise resource planning, ERP is business management software that allows an organization to use a system of integrated applications...
Companies initiate private cloud projects to enable their IT infrastructure to become more capable of quickly adapting to continually evolving...
A cloud backup (cloud computer backup) refers to backing up data to a remote, cloud-based server. As a form of cloud storage, cloud backup data is...
Raring Ringtail is the Ubuntu codename for version 13.04 of the Ubuntu Linux-based operating system.
ReRAM, or resistive memory cells, is a type of non-volatile memory that is considered to be a type of memristor technology.
A phrase that has become widely adopted to refer to mobile workers bringing their own mobile devices, such as smartphones, laptops and PDAs, into...
Short for customer relationship management, CRM entails all aspects of interaction a company has with its customer, whether it be sales or service...
The mobile operating system is the software platform on top of which other programs, called application programs, can run on mobile devices.
The phrase used to describe a cloud computing platform that is implemented within the corporate firewall, under the control of the IT department....