SlideShare a Scribd company logo
Codd's twelve rules are a set of thirteen rules (numbered zero to twelve) proposed by Edgar F. Codd, a
pioneer of the relational model for databases, designed to define what is required from a database
management system in order for it to be considered relational, i.e., a relational database management
system (RDBMS).

The rules
Rule (0): The system must qualify as relational, as a database, and as a management system.

For a system to qualify as a relational database management system (RDBMS), that system
must use its relational facilities (exclusively) to manage the database.

Rule 1: The information rule:

All information in the database is to be represented in only one way, namely by values in
column positions within rows of tables.

Rule 2: The guaranteed access rule:

All data must be accessible. This rule is essentially a restatement of the fundamental
requirement for primary keys. It says that every individual scalar value in the database must be
logically addressable by specifying the name of the containing table, the name of the containing
column and the primary key value of the containing row.

Rule 3: Systematic treatment of null values:

The DBMS must allow each field to remain null (or empty). Specifically, it must support a
representation of "missing information and inapplicable information" that is systematic, distinct
from all regular values (for example, "distinct from zero or any other number", in the case of
numeric values), and independent of data type. It is also implied that such representations
must be manipulated by the DBMS in a systematic way.

Rule 4: Active online catalog based on the relational model:

The system must support an online, inline, relational catalog that is accessible to authorized
users by means of their regular query language. That is, users must be able to access the
database's structure (catalog) using the same query language that they use to access the
database's data.

Rule 5: The comprehensive data sublanguage rule:

The system must support at least one relational language that

Has a linear syntax
Can be used both interactively and within application programs,

Supports data definition operations (including view definitions), data manipulation operations
(update as well as retrieval), security and integrity constraints, and transaction management
operations (begin, commit, and rollback).

Rule 6: The view updating rule:

All views that are theoretically updatable must be updatable by the system.

Rule 7: High-level insert, update, and delete:

The system must support set-at-a-time insert, update, and delete operators. This means that
data can be retrieved from a relational database in sets constructed of data from multiple rows
and/or multiple tables. This rule states that insert, update, and delete operations should be
supported for any retrievable set rather than just for a single row in a single table.

Rule 8: Physical data independence:

Changes to the physical level (how the data is stored, whether in arrays or linked lists etc.) must
not require a change to an application based on the structure.

Rule 9: Logical data independence:

Changes to the logical level (tables, columns, rows, and so on) must not require a change to an
application based on the structure. Logical data independence is more difficult to achieve than
physical data independence.

Rule 10: Integrity independence:

Integrity constraints must be specified separately from application programs and stored in the
catalog. It must be possible to change such constraints as and when appropriate without
unnecessarily affecting existing applications.

Rule 11: Distribution independence:

The distribution of portions of the database to various locations should be invisible to users of
the database. Existing applications should continue to operate successfully :

when a distributed version of the DBMS is first introduced; and

when existing distributed data are redistributed around the system.

Rule 12: The nonsubversion rule:
If the system provides a low-level (record-at-a-time) interface, then that interface cannot be
used to subvert the system, for example, bypassing a relational security or integrity constraint.

More Related Content

PDF
Coddsrules
PPT
Surya
PPTX
Codd rules
PPT
Codds12 rules
PPTX
Codds rule
PDF
Codd's Rules for Relational Database Management Systems
Coddsrules
Surya
Codd rules
Codds12 rules
Codds rule
Codd's Rules for Relational Database Management Systems

What's hot (18)

DOCX
Codd rules
PPT
Codd's rules
PPTX
Codds rules & keys
DOCX
Characteristics_of_the_database_system
PPTX
Dbms unit i
PPTX
Database
PPTX
Unit iii dbms
PPTX
Databases in 30 minutes.
PPTX
Advantages and disadvantages of relational databases
PPTX
Advantages of DBMS
TXT
Docs
PPS
Data models
PPTX
Active database
PDF
PPTX
Active database system
PPTX
Visible Governance: How to set up data governance using Visible Analyst Comme...
PPTX
Edgar f
Codd rules
Codd's rules
Codds rules & keys
Characteristics_of_the_database_system
Dbms unit i
Database
Unit iii dbms
Databases in 30 minutes.
Advantages and disadvantages of relational databases
Advantages of DBMS
Docs
Data models
Active database
Active database system
Visible Governance: How to set up data governance using Visible Analyst Comme...
Edgar f
Ad

Viewers also liked (19)

PDF
Daily equity-report by epic research 16 jan 2013
DOC
Oracle fusion-middleware-web logic-admin
PPTX
Marketing viral
PDF
NaturSand Pools Piscinas de Arena ing
PDF
Algorithm 110801105245-phpapp01-120223065724-phpapp02
PPT
Mutlimediaauthoringtools 120320065815-phpapp01
PPTX
Anchor data type,cursor data type,array data type
PPT
Goldblum Media
PDF
Chapter19 multimedia-091006115642-phpapp021-120309093503-phpapp02
PPTX
Regulatory proteins
DOCX
Coddrules 120309094848-phpapp02
PPTX
Lærerutdanning i praksis, Eva Bjerkholt
PPTX
Mobile Privacy & Litigation presented by Sedgwick at the #MobiU2013 Summit, 9...
PDF
Solar Energy Investment & Finance US
PPT
Hypertextandhypermedia 120320065133-phpapp01
PPTX
Marketing plan for souvenir shop in Hotel Z
PPT
Multimedia tools (sound)
ODP
Presentacion
ODP
sin nombre
Daily equity-report by epic research 16 jan 2013
Oracle fusion-middleware-web logic-admin
Marketing viral
NaturSand Pools Piscinas de Arena ing
Algorithm 110801105245-phpapp01-120223065724-phpapp02
Mutlimediaauthoringtools 120320065815-phpapp01
Anchor data type,cursor data type,array data type
Goldblum Media
Chapter19 multimedia-091006115642-phpapp021-120309093503-phpapp02
Regulatory proteins
Coddrules 120309094848-phpapp02
Lærerutdanning i praksis, Eva Bjerkholt
Mobile Privacy & Litigation presented by Sedgwick at the #MobiU2013 Summit, 9...
Solar Energy Investment & Finance US
Hypertextandhypermedia 120320065133-phpapp01
Marketing plan for souvenir shop in Hotel Z
Multimedia tools (sound)
Presentacion
sin nombre
Ad

Similar to Coddrules 120309094807-phpapp01 (20)

PPT
coddsrules in dbms using different -.ppt
PPTX
Boyce codd normal form explained with examples
PPTX
Entity Relationship Diagrams
PPTX
UNIT2-Reference ppt..pptx which weil; be leading tpo the undrsdtanding od thr...
PPTX
Edger F Codd's 13( 0 to 12) Rules for rdbms.
PPTX
Relational Database Management System part II
PPTX
Unit 2 DBMS.pptx
PDF
Dbms 9: Relational Model
PPTX
codd rules of dbms given by E F codd who is called father of dbms
PPT
What is Database Management System
PPT
dbms.ppt
DOC
Dbms new manual
PDF
Sql interview questions and answers
PDF
PPT
dbms.ppt
PPTX
introduction to relational model and codds rule.pptx
PPTX
RDBMS to NoSQL. An overview.
DOC
Database
coddsrules in dbms using different -.ppt
Boyce codd normal form explained with examples
Entity Relationship Diagrams
UNIT2-Reference ppt..pptx which weil; be leading tpo the undrsdtanding od thr...
Edger F Codd's 13( 0 to 12) Rules for rdbms.
Relational Database Management System part II
Unit 2 DBMS.pptx
Dbms 9: Relational Model
codd rules of dbms given by E F codd who is called father of dbms
What is Database Management System
dbms.ppt
Dbms new manual
Sql interview questions and answers
dbms.ppt
introduction to relational model and codds rule.pptx
RDBMS to NoSQL. An overview.
Database

Recently uploaded (20)

PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
01-Introduction-to-Information-Management.pdf
PPTX
master seminar digital applications in india
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Cell Types and Its function , kingdom of life
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
GDM (1) (1).pptx small presentation for students
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Renaissance Architecture: A Journey from Faith to Humanism
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
01-Introduction-to-Information-Management.pdf
master seminar digital applications in india
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Supply Chain Operations Speaking Notes -ICLT Program
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Sports Quiz easy sports quiz sports quiz
Cell Types and Its function , kingdom of life
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Complications of Minimal Access Surgery at WLH
FourierSeries-QuestionsWithAnswers(Part-A).pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
GDM (1) (1).pptx small presentation for students
O7-L3 Supply Chain Operations - ICLT Program
human mycosis Human fungal infections are called human mycosis..pptx

Coddrules 120309094807-phpapp01

  • 1. Codd's twelve rules are a set of thirteen rules (numbered zero to twelve) proposed by Edgar F. Codd, a pioneer of the relational model for databases, designed to define what is required from a database management system in order for it to be considered relational, i.e., a relational database management system (RDBMS). The rules Rule (0): The system must qualify as relational, as a database, and as a management system. For a system to qualify as a relational database management system (RDBMS), that system must use its relational facilities (exclusively) to manage the database. Rule 1: The information rule: All information in the database is to be represented in only one way, namely by values in column positions within rows of tables. Rule 2: The guaranteed access rule: All data must be accessible. This rule is essentially a restatement of the fundamental requirement for primary keys. It says that every individual scalar value in the database must be logically addressable by specifying the name of the containing table, the name of the containing column and the primary key value of the containing row. Rule 3: Systematic treatment of null values: The DBMS must allow each field to remain null (or empty). Specifically, it must support a representation of "missing information and inapplicable information" that is systematic, distinct from all regular values (for example, "distinct from zero or any other number", in the case of numeric values), and independent of data type. It is also implied that such representations must be manipulated by the DBMS in a systematic way. Rule 4: Active online catalog based on the relational model: The system must support an online, inline, relational catalog that is accessible to authorized users by means of their regular query language. That is, users must be able to access the database's structure (catalog) using the same query language that they use to access the database's data. Rule 5: The comprehensive data sublanguage rule: The system must support at least one relational language that Has a linear syntax
  • 2. Can be used both interactively and within application programs, Supports data definition operations (including view definitions), data manipulation operations (update as well as retrieval), security and integrity constraints, and transaction management operations (begin, commit, and rollback). Rule 6: The view updating rule: All views that are theoretically updatable must be updatable by the system. Rule 7: High-level insert, update, and delete: The system must support set-at-a-time insert, update, and delete operators. This means that data can be retrieved from a relational database in sets constructed of data from multiple rows and/or multiple tables. This rule states that insert, update, and delete operations should be supported for any retrievable set rather than just for a single row in a single table. Rule 8: Physical data independence: Changes to the physical level (how the data is stored, whether in arrays or linked lists etc.) must not require a change to an application based on the structure. Rule 9: Logical data independence: Changes to the logical level (tables, columns, rows, and so on) must not require a change to an application based on the structure. Logical data independence is more difficult to achieve than physical data independence. Rule 10: Integrity independence: Integrity constraints must be specified separately from application programs and stored in the catalog. It must be possible to change such constraints as and when appropriate without unnecessarily affecting existing applications. Rule 11: Distribution independence: The distribution of portions of the database to various locations should be invisible to users of the database. Existing applications should continue to operate successfully : when a distributed version of the DBMS is first introduced; and when existing distributed data are redistributed around the system. Rule 12: The nonsubversion rule:
  • 3. If the system provides a low-level (record-at-a-time) interface, then that interface cannot be used to subvert the system, for example, bypassing a relational security or integrity constraint.