Skip to main content

CODD RULES of RDBMS


Codd’s rules for RDBMS

(i)                The information rule.
(ii)             Guaranteed access of  data
(iii)           Systematic treatment of null value.
(iv)           On line DB support.
(v)             Comprehensive sup-language rule.
(vi)           The view update rule.
(vii)        Insert update rule.
(viii)      Physical data independence.
(ix)           Logical data independence.
(x)             Integrity rule
(xi)           DB distribution rule.
(xii)        Non subversion rule.

The information rule:-All information in a relational database including table names, column names is presented by values in tables.
Guaranteed access of data:- Every piece of data in a relational database, can be accessed by using a combination of a tuple name, a primary key value that identifies the row and a column name, which identifies a cell.
Systematic treatment of null value:- It systematic treatment of null value.
On line DB support:- User car access the data online by simple query.
                        à If data is on internet then the data can be access able.
Comprehensive sup-language rule:-Easy language for accessing the database.
       à For crate a table we can use create student(Name, ph.) table.
       à For access a attribute we can use select name from student.

The view update rule:- The change must reflect permanently.
              à Any view that can be updated theoretically can be updated using the RDBMS.

Insert update rule:- You can add new record in data base and you can delete the record and change the record.
             à The RDBMS supports insertion, updating and deletion at a table level.

Physical data independence:- On changing the location of data it never affect.
        àThe execution of ad hoc requests and application programs is not affected by changes in the physical data access and storage methods.

Logical data independence:- We can access any attribute randomly of similar attribute.
       à Logical change in tables and views such as adding/deleting columns or changing field lengths need not necessitate modifications in the programmer or in the format of adhoc requests.

Integrity rule:- In data base when change the data forcefully the data can be change.
         à There are two types of integrity rule:-
     Entity integrity rule:-  In any table, any primary key value never null, called integrity rule.

#s_id
name
add
dob
class
1
2
3
4
5
A
S
D
V
G

Q
W
E
R
T
12
14
16
17
13
12th
Bca
Mca
Pgdca
Mba

#p_id
P_name
duration
S_id
P_1
P_2
P_3
P_4
P_5
C++
Vb
Java
Php
html

2
5
6
8
9
1
2
3
4
5



     
















Referential integrity rule:- Linking maintain by the referential that means referential rule use foreign key for linking to another table.

Database distribution rule:- If multiple users access the same data then same copy available for all.

Non subversion rule:- Only one user can perform modification on single database at a time that means multiple user can’t perform modification on processing  time.


Comments

  1. Sir hm longo ko aapne online db support to bataye hi nahi the

    ReplyDelete
  2. Here is Instant Approval Social Bookmarking or high DA Social Bookmarking sites list. you can use all good bookmarks sites and increase your ranking .

    ReplyDelete

Post a Comment

Popular posts from this blog

Learn Programming in UNIX

Q: - Write a program to input two numbers and add them?             gedit add.sh             clear             echo “enter two numbers:”             read a             read b             sum=`expr$a+$b`             echo $sum Syntax for if-else:- (1)          if test condition             then                 ---------                 --...

O Level Practical Queestion Paper (MS-OFFICE, MSDOS, MS-EXCEL, ICT Resources)

MSDOS 1. Write command to display all files having extension ‘jpg’. 2. Write command to display all files of all types starting with letter ‘m’. 3. Write command to display all files having names up to ten characters with second last letter as ‘n’, e.g. intelligent. 4. Write a command to copy the file mars of type exe from the directory ‘space’ of drive U to another directory “universe” in drive S. 5. Write a command to delete the directory as well as the files of the directory ‘world’ on drive E. 6. Write command to display all file names on the disk in drive A and having an extension of no more than two characters.   7. Write command to copy all the files beginning with ‘m’ and whose file names has a ‘txt’ extension from drive A to the ‘\document’ directory on drive C. 8. Write set of commands to create a subdirectory of the root directory called ‘exercise’, and then move into it 9. Perform the following tasks using DOS commands in the DOS sh...

Concept of Object-Oriented Programming Concept

Concept of Object-Oriented Programming Concept Object Oriented Programming is performed by using class and object.  Class is a set of States and behaviors. Class is also known as a blue print of an object. Class is called an Object factory where more than one object is created. The object is used for accessing all the functionality of Class. An example of Class and Object is CAR----> It is a class  Wagon R, Maruti 800, Alto, Seltos, etc are examples of objects. Object-Oriented Principle:- Encapsulation:- It is a process of binding the data and method in a single unit. A general example of encapsulation is Capsules, Bike, Cake, and others where the data is wrapped in a single unit. The Class is also an example of Encapsulation because Class also binds the state and behavior. Abstraction: Abstraction is a process where only essential information is shown for use and unnecessary information about an object is hidden from the user. ATM is an example of Abstraction where users...