Skip to main content

CODD RULES of RDBMS


Codd’s rules for RDBMS

(i)                The information rule.
(ii)             Guaranteed access of  data
(iii)           Systematic treatment of null value.
(iv)           On line DB support.
(v)             Comprehensive sup-language rule.
(vi)           The view update rule.
(vii)        Insert update rule.
(viii)      Physical data independence.
(ix)           Logical data independence.
(x)             Integrity rule
(xi)           DB distribution rule.
(xii)        Non subversion rule.

The information rule:-All information in a relational database including table names, column names is presented by values in tables.
Guaranteed access of data:- Every piece of data in a relational database, can be accessed by using a combination of a tuple name, a primary key value that identifies the row and a column name, which identifies a cell.
Systematic treatment of null value:- It systematic treatment of null value.
On line DB support:- User car access the data online by simple query.
                        à If data is on internet then the data can be access able.
Comprehensive sup-language rule:-Easy language for accessing the database.
       à For crate a table we can use create student(Name, ph.) table.
       à For access a attribute we can use select name from student.

The view update rule:- The change must reflect permanently.
              à Any view that can be updated theoretically can be updated using the RDBMS.

Insert update rule:- You can add new record in data base and you can delete the record and change the record.
             à The RDBMS supports insertion, updating and deletion at a table level.

Physical data independence:- On changing the location of data it never affect.
        àThe execution of ad hoc requests and application programs is not affected by changes in the physical data access and storage methods.

Logical data independence:- We can access any attribute randomly of similar attribute.
       à Logical change in tables and views such as adding/deleting columns or changing field lengths need not necessitate modifications in the programmer or in the format of adhoc requests.

Integrity rule:- In data base when change the data forcefully the data can be change.
         à There are two types of integrity rule:-
     Entity integrity rule:-  In any table, any primary key value never null, called integrity rule.

#s_id
name
add
dob
class
1
2
3
4
5
A
S
D
V
G

Q
W
E
R
T
12
14
16
17
13
12th
Bca
Mca
Pgdca
Mba

#p_id
P_name
duration
S_id
P_1
P_2
P_3
P_4
P_5
C++
Vb
Java
Php
html

2
5
6
8
9
1
2
3
4
5



     
















Referential integrity rule:- Linking maintain by the referential that means referential rule use foreign key for linking to another table.

Database distribution rule:- If multiple users access the same data then same copy available for all.

Non subversion rule:- Only one user can perform modification on single database at a time that means multiple user can’t perform modification on processing  time.


Comments

  1. Sir hm longo ko aapne online db support to bataye hi nahi the

    ReplyDelete
  2. Here is Instant Approval Social Bookmarking or high DA Social Bookmarking sites list. you can use all good bookmarks sites and increase your ranking .

    ReplyDelete

Post a Comment

Popular posts from this blog

O Level Practical Queestion Paper (MS-OFFICE, MSDOS, MS-EXCEL, ICT Resources)

MSDOS 1. Write command to display all files having extension ‘jpg’. 2. Write command to display all files of all types starting with letter ‘m’. 3. Write command to display all files having names up to ten characters with second last letter as ‘n’, e.g. intelligent. 4. Write a command to copy the file mars of type exe from the directory ‘space’ of drive U to another directory “universe” in drive S. 5. Write a command to delete the directory as well as the files of the directory ‘world’ on drive E. 6. Write command to display all file names on the disk in drive A and having an extension of no more than two characters.   7. Write command to copy all the files beginning with ‘m’ and whose file names has a ‘txt’ extension from drive A to the ‘\document’ directory on drive C. 8. Write set of commands to create a subdirectory of the root directory called ‘exercise’, and then move into it 9. Perform the following tasks using DOS commands in the DOS sh...

Learn Programming in UNIX

Q: - Write a program to input two numbers and add them?             gedit add.sh             clear             echo “enter two numbers:”             read a             read b             sum=`expr$a+$b`             echo $sum Syntax for if-else:- (1)          if test condition             then                 ---------                 --...

IICS College 15th August Celebration Day

IICS COLLEGE  15th August Celebration Day