Database - Advantages & Disadvantages: Codd's 12 Rules
Database - Advantages & Disadvantages: Codd's 12 Rules
Database - Advantages & Disadvantages: Codd's 12 Rules
Advantages
Disadvantages
Codd's 12 rules
From Wikipedia, the free encyclopedia
[[File:Example.jpg]]Codd's 12 rules are a set of thirteen rules (numbered zero to twelve) proposed by Edgar F. Codd, a pioneer of the relational
model for databases, designed to define what is required from a database management system in order for it to be considered relational, i.e., an relational
database management system RDBMS.[1][2] They are sometimes jokingly referred to as "Codd's Twelve Commandments".
Codd produced these rules as part of a personal campaign to prevent his vision of the relational database being diluted, as database vendors scrambled in the
early 1980s to repackage existing products with a relational veneer. Rule 12 was particularly designed to counter such a positioning. In fact, the rules are so strict
that all popular so-called "relational" DBMSs fail on many of the criteria.[citation needed]
[edit]The rules
Rule 0: The system must qualify as relational, as a database, and as a management system.
For a system to qualify as a relational database management system (RDBMS), that system must use its relational facilities (exclusively)
to manage the database.
All information in the database is to be represented in one and only one way, namely by values in column positions within rows of tables.
Rule 2: The guaranteed access rule:
All data must be accessible. This rule is essentially a restatement of the fundamental requirement for primary keys. It says that every individual scalar
value in the database must be logically addressable by specifying the name of the containing table, the name of the containing column and the
The DBMS must allow each field to remain null (or empty). Specifically, it must support a representation of "missing information and inapplicable
information" that is systematic, distinct from all regular values (for example, "distinct from zero or any other number", in the case of numeric values),
and independent of data type. It is also implied that such representations must be manipulated by the DBMS in a systematic way.
The system must support an online, inline, relational catalog that is accessible to authorized users by means of their regular query language. That is,
users must be able to access the database's structure (catalog) using the same query language that they use to access the database's data.
3. Supports data definition operations (including view definitions), data manipulation operations (update as well as retrieval), security and
All views that are theoretically updatable must be updatable by the system.
The system must support set-at-a-time insert, update, and delete operators. This means that data can be retrieved from a relational database in sets
constructed of data from multiple rows and/or multiple tables. This rule states that insert, update, and delete operations should be supported for any
retrievable set rather than just for a single row in a single table.
Changes to the physical level (how the data is stored, whether in arrays or linked lists etc.) must not require a change to an application based on the
structure.
Changes to the logical level (tables, columns, rows, and so on) must not require a change to an application based on the structure. Logical data
The distribution of portions of the database to various locations should be invisible to users of the database. Existing applications should continue to
operate successfully :
If the system provides a low-level (record-at-a-time) interface, then that interface cannot be used to subvert the system, for example, bypassing a
Knowledge-based systems
From Wikipedia, the free encyclopedia
Knowledge based systems are artificial intelligent tools working in a narrow domain to
provide intelligent decisions with justification. Knowledge is acquired and represented using
various knowledge representation techniques rules, frames and scripts. The basic
advantages offered by such system are documentation of knowledge, intelligent decision
support, self learning, reasoning and explanation. Akerkar RA and Sajja Priti
Srinivas: “Knowledge-based systems”, Jones & Bartlett Publishers, Sudbury, MA, USA
(2009)
knowledge base
acquisition mechanisms
inference mechanisms
While for some authors[who?] expert systems, case-based reasoning systems and neural
networks are all particular types of knowledge-based systems, there are others who
consider that neural networks are different, and exclude it from this category.[citation needed]
Knowledge representation techniques
CONCEPTUAL LEVEL
. Represents:
- constraints on data
- semantic information on data
INTERNAL LEVEL
- Record placement
Mappings:
The process to convert a request (from external level) and the result between view levels is
called mapping.
Data independence :
The disjointing of data descriptions from the application programs (or user-interfaces) that uses
the data is called data independence .
Data independence is the type of data transparency that matters for a centralized DBMS. It
refers to the immunity of user applications to make changes in the definition and organization of
data
The ability to change the physical schema without changing the logical schema is called physical data
independence. For example, a change to the internal schema, such as using different file organization or
storage structures, storage devices, or indexing strategy, should be possible without having to change
the conceptual or external schemas.
The ability to change the logical (conceptual) schema without changing the External schema is called
logical data independence. For example, the addition or removal of new entities, attributes, or
relationships to the conceptual schema should be possible without having to change existing external
schemas or having to rewrite existing application programs.