Searching the database - micro cds/isis application, Software Engineering

Assignment Help:

Searching the Database:

Searching the database and printing the results of a search are important features associated with CDS/ISIS package. The query formulation strategy provided in the package uses basically Boolean logic which is enriched by proximity operators. The software allows searching only on indexed fields (through FST). Searches may be stored and recalled again for display. sorting, writing to disk or printing. Saved search expressions may also be combined by using Boolean operators to further refine the searches. The search results may be output in a variety of formats by using the formatting language, In addition to the main features discussed in the foregoing sections, the 'micro CDS/ISIS package provides data exchange facilities. In other words, the software package is able to accept and to produce data files applying the ISO 2709 standard format. This facility allows moving of databases from one information management system to another.  


Related Discussions:- Searching the database - micro cds/isis application

Memory locations and registers pc-ir-mar, Assume 64 different op codes and ...

Assume 64 different op codes and 19-bit instruction word in a computer system. Two bits in the instruction are reserved to indicate the addressing mode.    a. Draw a box style ske

Explain about token count - software metrics, Q. Explain about token count ...

Q. Explain about token count - software metrics? Token count :- A program is considered to be series of tokens and if we count the number of tokens, some interesting results m

What is statement coverage, What is statement coverage? Statement cover...

What is statement coverage? Statement coverage is the testing to test each statement in the code has been executed at least once.

Explain system testing, The process of testing an integrated hardware and s...

The process of testing an integrated hardware and software system to determine that the system meets its described requirements. Such testing might be conducted in both the develop

What is security testing, What is security testing? Security testing at...

What is security testing? Security testing attempts to determine that protection mechanism built into a system will protect it from improper penetration.

Scenario easy travel singapore ets, select alife cycle model that you would...

select alife cycle model that you would follow during the devolpment of the easy travil singapore system. give an outline description of thise life cycle and justify your chice of

Explain cause effect graphing, Q. Explain cause effect graphing? Cause...

Q. Explain cause effect graphing? Cause-effect graphing is the test case design technique that offers a concise representation of logical conditions and corresponding actions

Com 101p, Peripheral devices are irrelevant to the computer

Peripheral devices are irrelevant to the computer

Different server platforms for erp systems, Question: a. Assume that yo...

Question: a. Assume that you have three similar projects, and, in each, the ratios of problems found during system test versus first year in the field have been 1.5, 1.2, and

List the principles of a software design, List the principles of a software...

List the principles of a software design. i. The design process should not undergo from "tunnel vision". ii. The design should be traceable to the analysis model. iii. Th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd