Examples of online databases, Basic Computer Science

Assignment Help:

Examples of Online Databases:

The adoption of modern technology has resulted in the proliferation of machine readable databases. The National Library of Medicine (USA) designed its MEDLARS which became operational in 1964. Later appeared its online version as MEDLINE. Engineering Index of the Engineers° Joint Council (USA) and Biological Abstracts soon had their corresponding online versions, viz., COMPENDEX and BIOSIS. Yet another very large online database is that of Information Services for Physics and Engineering Communities, called INSPEC (UK) representing the three printed versions of Physics Abstracts, Electrical and Electronic Abstracts and Computers and Control Abstracts.

CA Search and AGRICOLA, the online counterparts respectively of Chemical Abstracts and Bibliography of Agriculture (NAL, USA) are worth mentioning. These are all also devoted to sciences. Of the social sciences, there exist a number of large online databases particularly in economics, psychology, political science and management. For example, PsychINFO is the online version of Psychological Abstracts. 

MARC database of the Library of Congress is a good source to search for resources in humanities. It is also worthwhile to know about two full text online databases: one is LEXIS in law and the other is NEXIS that offers several newspapers and business publications. 


Related Discussions:- Examples of online databases

Computerised systems, Computerised Systems : You would have realized by no...

Computerised Systems : You would have realized by now that computing systems are most useful for manipulating information. Any organisation and management of information basically

C, A palindrome is a string that reads the same from both the ends. Given a...

A palindrome is a string that reads the same from both the ends. Given a string S convert it to a palindrome by doing character replacement. Your task is to convert S to palindrome

Properties of Dictionary Keys, Dictionary values encompass no limitations. ...

Dictionary values encompass no limitations. They can be any random Python object, moreover standard objects or user-defined objects. Though, same is not true for the keys. There ar

Java programming, Write a program that lets the user play the game Rock, Pa...

Write a program that lets the user play the game Rock, Paper, Scissors against the computer. The program should work as follows: ? When the program begins, the results of the prev

Cisc, two characteristics og CISC architecture?

two characteristics og CISC architecture?

Hacking, how can i hack a server

how can i hack a server

Architecture, explain how modern computers conform to john von nuemann''s a...

explain how modern computers conform to john von nuemann''s architeture?

Keystroke logger and data-stealing, Keystroke logger and Data-stealing: ...

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

Digital transmission, Digital Transmission: In digital transmission, w...

Digital Transmission: In digital transmission, wave patterns are translated into discrete bits and are separated by intervals. Bits (contraction for binary digits) are the sma

Network control, Network Control, Engineering and Management Network co...

Network Control, Engineering and Management Network control in this sense involves traffic management, and the engineering of the networks to support varying traffic loads. In

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd