Knowledge

Codd's 12 rules

Source 📝

156:
A relational system may support several languages and various modes of terminal use (for example, the fill-in-the-blanks mode). However, there must be at least one language whose statements are expressible, per some well-defined syntax, as character strings and that is comprehensive in supporting all
58:
Codd originally set out the rules in 1970, and developed them further in a 1974 conference paper. His aim was to prevent the vision of the original relational database from being diluted, as database vendors scrambled in the early 1980s to repackage existing products with a relational veneer. Rule 12
62:
While in 1999, a textbook stated "Nowadays, most RDBMSs ... pass the test", another in 2007 suggested "no database system complies with all twelve rules." Codd himself, in his book "The Relational Model for Database Management: Version 2", acknowledged that while his original set of 12 rules can be
118:
Null values (distinct from the empty character string or a string of blank characters and distinct from zero or any other number) are supported in fully relational DBMS for representing missing information and inapplicable information in a systematic way, independent of data
285:
If a relational system has a low-level (single-record-at-a-time) language, that low level cannot be used to subvert or bypass the integrity rules and constraints expressed in the higher level relational language
74:
The foundation rule: For any system that is advertised as, or claimed to be, a relational data base management system, that system must be able to manage data bases entirely through its relational capabilities.
140:
The data base description is represented at the logical level in the same way as ordinary data, so that authorized users can apply the same relational language to its interrogation as they apply to the regular
242:
Application programs and terminal activities remain logically unimpaired when information-preserving changes of any kind that theoretically permit unimpairment are made to the base tables.
256:
Integrity constraints specific to a particular relational data base must be definable in the relational data sublanguage and storable in the catalog, not in the application programs.
214:
The capability of handling a base relation or a derived relation as a single operand applies not only to the retrieval of data but also to the insertion, update and deletion of data.
104:
Each and every datum (atomic value) in a relational data base is guaranteed to be logically accessible by resorting to a combination of table name, primary key value and column name.
270:
The end-user must not be able to see that the data is distributed over various locations. Users should always get the impression that the data is located at one site only.
228:
Application programs and terminal activities remain logically unimpaired whenever any changes are made in either storage representations or access methods.
89:
All information in a relational data base is represented explicitly at the logical level and in exactly one way – by values in tables.
369: 63:
used for coarse distinctions, the 333 features of his Relational Model Version 2 (RM/V2) are needed for distinctions of a finer grain.
47: 440: 554: 535: 516: 484: 450: 416: 406: 379: 39: 583: 578: 573: 408:
Transact-SQL Programming: Covers Microsoft SQL Server 6.5 /7.0 and Sybase Adaptive Server 11.5
23: 8: 530:. The Morgan Kaufmann Series in Data Management Systems (2nd ed.). Morgan Kaufmann. 550: 531: 512: 480: 446: 412: 375: 131: 31: 474: 316: 567: 504: 27: 199:
All views that are theoretically updatable are also updatable by the system.
545:
Krishna, S. (1992). "Criteria for Evaluating Relational Database Systems".
296: 50:(RDBMS). They are sometimes referred to as "Codd's Twelve Commandments". 549:. Computer Science. Vol. 28. World Scientific. pp. 91 et seq. 353:
Codd, Edgar Frank (21 October 1985), "Does Your DBMS Run By the Rules",
338:
Codd, Edgar Frank (14 October 1985), "Is Your DBMS Really Relational?",
190: 442:
Microsoft Office Access 2007: The L Line, The Express Line to Learning
35: 128: 59:
was particularly designed to counter such a positioning.
509:
The relational model for database management: Version 2
476:
The Relational Model for Database Management: Version 2
177:
Transaction boundaries (begin, commit and rollback).
547:
Introduction to Database and Knowledge-Base Systems
405:Kline, Kevin; Gould, Lee; Zanevsky, Andrew (1999). 404: 208:Possible for high-level insert, update, and delete 565: 168:Data manipulation (interactive and by program). 479:. Addison-Wesley Longman Publishing Co., Inc. 38:, designed to define what is required from a 528:Relational Database Design Clearly Explained 526:Harrington, Jan L. (2002). "Codd's Rules". 525: 309: 371:Man vs Big Data: Everyday data explained 544: 400: 398: 566: 367: 361: 48:relational database management system 503: 472: 438: 395: 352: 337: 466: 432: 150:comprehensive data sublanguage rule 112:Systematic treatment of null values 13: 497: 14: 595: 42:in order for it to be considered 346: 331: 1: 302: 286:(multiple-records-at-a-time). 206:Relational Operations Rule / 134:based on the relational model 22:are a set of thirteen rules ( 7: 290: 10: 600: 222:Physical data independence 53: 40:database management system 16:Relational database design 264:Distribution independence 236:Logical data independence 368:Cowley, Stewart (2017). 157:of the following items: 66: 473:Codd, Edgar F. (1990). 319:. RelDB.org. 2019-06-30 24:numbered zero to twelve 439:Hess, Kenneth (2007). 250:Integrity independence 171:Integrity constraints. 98:guaranteed access rule 30:, a pioneer of the 20:Codd's twelve rules 511:. Addison-Wesley. 279:nonsubversion rule 317:"Codd's 12 Rules" 591: 584:Relational model 560: 541: 522: 491: 490: 470: 464: 463: 461: 459: 436: 430: 429: 427: 425: 402: 393: 392: 390: 388: 365: 359: 357: 350: 344: 342: 335: 329: 328: 326: 324: 313: 165:View definition. 162:Data definition. 83:information rule 32:relational model 599: 598: 594: 593: 592: 590: 589: 588: 579:Database theory 564: 563: 557: 538: 519: 500: 498:Further reading 495: 494: 487: 471: 467: 457: 455: 453: 437: 433: 423: 421: 419: 403: 396: 386: 384: 382: 366: 362: 351: 347: 336: 332: 322: 320: 315: 314: 310: 305: 293: 69: 56: 17: 12: 11: 5: 597: 587: 586: 581: 576: 562: 561: 555: 542: 536: 523: 517: 505:Codd, Edgar F. 499: 496: 493: 492: 485: 465: 451: 431: 417: 394: 380: 360: 345: 330: 307: 306: 304: 301: 300: 299: 292: 289: 288: 287: 272: 271: 258: 257: 244: 243: 230: 229: 216: 215: 201: 200: 183: 182: 181: 180: 179: 178: 175: 174:Authorization. 172: 169: 166: 163: 143: 142: 121: 120: 106: 105: 91: 90: 68: 65: 55: 52: 26:) proposed by 15: 9: 6: 4: 3: 2: 596: 585: 582: 580: 577: 575: 574:Data modeling 572: 571: 569: 558: 556:9789810206192 552: 548: 543: 539: 537:9781558608207 533: 529: 524: 520: 518:9780201141924 514: 510: 506: 502: 501: 488: 486:9780201141924 482: 478: 477: 469: 454: 452:9780470107904 448: 444: 443: 435: 420: 418:9781565924017 414: 410: 409: 401: 399: 383: 381:9781781317563 377: 373: 372: 364: 356: 355:Computerworld 349: 341: 340:Computerworld 334: 318: 312: 308: 298: 295: 294: 284: 283: 282: 280: 276: 269: 268: 267: 265: 262: 255: 254: 253: 251: 248: 241: 240: 239: 237: 234: 227: 226: 225: 223: 220: 213: 212: 211: 209: 205: 198: 197: 196: 194: 193:updating rule 192: 187: 176: 173: 170: 167: 164: 161: 160: 159: 158: 155: 154: 153: 151: 147: 139: 138: 137: 135: 133: 130: 125: 117: 116: 115: 113: 110: 103: 102: 101: 99: 95: 88: 87: 86: 84: 80: 76: 73: 64: 60: 51: 49: 45: 41: 37: 33: 29: 28:Edgar F. Codd 25: 21: 546: 527: 508: 475: 468: 456:. Retrieved 441: 434: 422:. Retrieved 407: 385:. Retrieved 370: 363: 354: 348: 339: 333: 321:. Retrieved 311: 297:IBM System R 278: 274: 273: 263: 260: 259: 249: 246: 245: 235: 232: 231: 221: 218: 217: 207: 203: 202: 189: 185: 184: 149: 145: 144: 126: 123: 122: 111: 108: 107: 97: 93: 92: 82: 78: 77: 71: 70: 61: 57: 43: 19: 18: 568:Categories 458:22 January 424:22 January 387:22 January 323:August 14, 303:References 46:, i.e., a 44:relational 36:databases 507:(1990). 291:See also 275:Rule 12: 261:Rule 11: 247:Rule 10: 127:Dynamic 233:Rule 9: 219:Rule 8: 204:Rule 7: 186:Rule 6: 146:Rule 5: 132:catalog 124:Rule 4: 109:Rule 3: 94:Rule 2: 79:Rule 1: 72:Rule 0: 54:History 553:  534:  515:  483:  449:  415:  378:  129:online 141:data. 119:type. 67:Rules 551:ISBN 532:ISBN 513:ISBN 481:ISBN 460:2022 447:ISBN 426:2022 413:ISBN 389:2022 376:ISBN 325:2020 277:The 191:view 188:The 148:The 96:The 81:The 34:for 570:: 445:. 411:. 397:^ 374:. 281:: 266:: 252:: 238:: 224:: 210:: 195:: 152:: 136:: 114:: 100:: 85:: 559:. 540:. 521:. 489:. 462:. 428:. 391:. 358:. 343:. 327:.

Index

numbered zero to twelve
Edgar F. Codd
relational model
databases
database management system
relational database management system
online
catalog
view
IBM System R
"Codd's 12 Rules"
Man vs Big Data: Everyday data explained
ISBN
9781781317563


Transact-SQL Programming: Covers Microsoft SQL Server 6.5 /7.0 and Sybase Adaptive Server 11.5
ISBN
9781565924017
Microsoft Office Access 2007: The L Line, The Express Line to Learning
ISBN
9780470107904
The Relational Model for Database Management: Version 2
ISBN
9780201141924
Codd, Edgar F.
ISBN
9780201141924
ISBN
9781558608207

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.