Introduction to database management systems
Chapters
Codd's 12 Rules
The information rule
The information rule simply requires all information in databases to be represented only one way.
The guaranteed access rule
All data must be accessible. This rule is essentially a restatement of the fundamental requirement for primary keys.
Systematic treatment of null values
The DBMS is required to support a representation of "missing information and inapplicable information" that is systematic, distinct from all regular values and independent of data type.
Active online catalog
The system is required to support an online, inline, relational catalog that is accessible to authorized users by means of their regular query language.
Comprehensive data sublanguage rule
The system must support a least one relational language that has a linear syntax
(b) Can be used both interactively and within application programs
(c) Supports data definition operations (including view definitions)
View updating rule
All views that are theoretically updatable must be updatable by the system.
High-level insert, update, and delete
The system must support set-at-a-time INSERT, UPDATE, and DELETE operators.
Physical data independence
Changes to physical level (how data is stored, whether in arrays or linked lists etc.) must not require a change to an application based on structure.
Logical data independence
Changes to logical level (tables, rows, columns and so on) must not require a change to an application based on structure. Logical data independence is more difficult to achieve than physical data independence.
Integrity independence
Integrity constraints must be specified separately from application programs and stored in a catalog.
Distribution independence
Existing applications should continue to operate successfully
(a) When a distributed version of DBMS is first introduced.
(b) When existing distributed data is redistributed around system.
The non-subversion rule
If system provides a low-level (record-at-a-time) interface, then that Interface cannot be used to subvert the system (e.g.) bypassing a relational security or integrity constraint.
Description
This free tutorial covers the basics of database management system to help you with your understanding on the topic, Please note that this tutorial assumes that either you are a beginner or just want to brush up your understanding on DBMS
Tutorial covers the topics below
- What is DBMS?
- Architecture
- Data Models
- Data Schemas
- Data Independence
- Entity-Relation Model Basic Concept
- Entity-Relation Diagram Representation
- Generalization, Aggregation
- Codd's 12 Rules
- Relational Data Model
- Relational Algebra
- Structured Query Language
- Normalization
- Database Joins
- Storage System
- Indexing
- Hashing
- Transaction
- Concurrency Control and Deadlock
- Data Backup and Recovery
Audience
Absolute beginners or students who wish to brush up their understanding on DBMSes
Author: Subject Coach
Added on: 16th Sep 2015
You must be logged in as Student to ask a Question.
None just yet!