Searching the database - micro cds/isis application, Software Engineering

Assignment Help:

Searching the Database:

Searching the database and printing the results of a search are important features associated with CDS/ISIS package. The query formulation strategy provided in the package uses basically Boolean logic which is enriched by proximity operators. The software allows searching only on indexed fields (through FST). Searches may be stored and recalled again for display. sorting, writing to disk or printing. Saved search expressions may also be combined by using Boolean operators to further refine the searches. The search results may be output in a variety of formats by using the formatting language, In addition to the main features discussed in the foregoing sections, the 'micro CDS/ISIS package provides data exchange facilities. In other words, the software package is able to accept and to produce data files applying the ISO 2709 standard format. This facility allows moving of databases from one information management system to another.  


Related Discussions:- Searching the database - micro cds/isis application

Srs, why srs is also called black box specificaton

why srs is also called black box specificaton

Swot analysis, how to threat into opportunities and weaknesses into streng...

how to threat into opportunities and weaknesses into strength

What are the demerits of spiral model, What are the demerits of spiral mode...

What are the demerits of spiral model? i. It is depends on customer communication. If the communication is not suitable then the software product that gets developed will not r

What is software maintenance and cocomo model, What is software maintenance...

What is software maintenance? Software maintenance is a set actions in which program are customized after it has been put into use. COCOMO model :- COnstructive COst MOd

Need of data dictionaries, Objectives of Data dictionaries:- 1) A stand...

Objectives of Data dictionaries:- 1) A standard definition of every terms in a system that is each item of data is uniquely identified and defined. 2) Simple cross-referenci

What are the important points to do software design, What are the important...

What are the important points to do software design The below points must be kept in mind when performing the design:  i) Practicality: This ensures that system is stable

What are the three activities of risk assessment, What are the three activi...

What are the three activities of risk assessment? The three activities are identifying, examining and giving priorities . Risks can be identified by a check list or looking at

Relationship between agent technology and grid computing, Question: (a)...

Question: (a) Show three application areas for agents. (b) What do you meant by "temporally coupled coordination"? Provide an example of a temporally coupled coordination

What are white-box and black-box, What are white-box, black-box and gray-bo...

What are white-box, black-box and gray-box testing? White Box (or glass box) testing is the METHOD of giving i/p to the system and checking how the system processes i/p to prod

How the case tools are classified, How the CASE tools are classified? C...

How the CASE tools are classified? CASE tools can be classified by A. By function or use B. By user type(e.g. manager,tester),or C. By stage in software engineering pr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd