Create a subroutine, Database Management System

Assignment Help:

1. Create a subroutine that does the remote blast on the file protein.fa.

2. Pass that returned files from the blast to another subroutine that parses the output and sends it to an outfile. The returned values are the following: name, length, mismatches, and percent identity of the highest scoring hits.

3. You must demonstrate that you can set up an analysis pipeline using BioPerl, subroutines and Object Oriented Perl.

4. The file for processing is in Lecture10, protein.fa.


Related Discussions:- Create a subroutine

Explain the function of object model, Explain the function of Object model ...

Explain the function of Object model Object model describes the classes of objects in system, including their attributes and operations which they support. The analysis object

What is odbc and what is its function, Question: (a) What is ODBC and w...

Question: (a) What is ODBC and what is its function? (b) What is Web application server, and how does it work from a database perspective? (c) What does e-commerce mean

Data modelling, Law Associates is a large legal practice based in Sydney.  ...

Law Associates is a large legal practice based in Sydney.  You have been asked to design a data model for the practice based upon the following specification: The practice emplo

What is stored procedure, What is Stored Procedure? A stored procedure ...

What is Stored Procedure? A stored procedure is a named group of SQL statements that have been previously formed and kept in the server database. Stored procedures accept input

Create a new user-data control, Create a new user : CREATE USER IDENTI...

Create a new user : CREATE USER IDENTIFIED BY Example: //CREATE USER MCA12 IDENTIFIED BY W123 Grant: It is used to give database access permission to users. It is of

Example of relational operations, Consider the relation PERSON. If you want...

Consider the relation PERSON. If you want to display details of persons having age less than or equal to 30 than the select operation will be used as follows: σ AGE The resu

Types of locks, Types of Locks There are two necessary types of locks: ...

Types of Locks There are two necessary types of locks: Binary lock : This locking mechanism has two states for to a data item: locked or unlocked Multiple-mode loc

Define rule that value of foreign key appear in other table, Determine the ...

Determine the rule that a value of a foreign key should appear as a value of some particular table is called a  Ans: Referential constraint.    The rule that a value of a fo

What is called an evaluation primitive, What is called an evaluation primit...

What is called an evaluation primitive? A relational algebra operation annotated with instructions on how to evaluate is known as an evaluation primitive.

What are the various symbols used to draw an e-r diagram, What are the vari...

What are the various symbols used to draw an E-R diagram? Explain with the help of an example how weak entity sets are represented in an E-R diagram. Various symbols used to d

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd