Searching the database - micro cds/isis application, Software Engineering

Assignment Help:

Searching the Database:

Searching the database and printing the results of a search are important features associated with CDS/ISIS package. The query formulation strategy provided in the package uses basically Boolean logic which is enriched by proximity operators. The software allows searching only on indexed fields (through FST). Searches may be stored and recalled again for display. sorting, writing to disk or printing. Saved search expressions may also be combined by using Boolean operators to further refine the searches. The search results may be output in a variety of formats by using the formatting language, In addition to the main features discussed in the foregoing sections, the 'micro CDS/ISIS package provides data exchange facilities. In other words, the software package is able to accept and to produce data files applying the ISO 2709 standard format. This facility allows moving of databases from one information management system to another.  


Related Discussions:- Searching the database - micro cds/isis application

What are the elements of analysis model, What are the elements of Analysis ...

What are the elements of Analysis model? i. Data Dictionary ii. Data Flow Diagram iii. Entity Relationship Diagram iv. State Transition Diagram v. Process specifica

What is customer (end user), What is Customer (end user)? Ans) The organ...

What is Customer (end user)? Ans) The organization or individual, internal or external to the producing organization that takes the product.

Define data objects attributes and relationship, Define Data objects, attr...

Define Data objects, attributes & relationship. Data object: Illustration of any composite information that must be understood by a software. It can be any external entity. Att

What are the benefits of using stored procedures, What are the benefits of ...

What are the benefits of using Stored Procedures? - They help in reducing network traffic and latency which in turn boosts application performance. - They assist in promotin

Explain inspection, Explain Inspection? Ans) An inspection is more forma...

Explain Inspection? Ans) An inspection is more formalized than a 'walkthrough', typically with 3-8 people containing a moderator, reader, and a recorder to take notes. The subje

Draw a memory map for a system, Draw a memory map for a system with a memor...

Draw a memory map for a system with a memory capacity of 256MB. Each memory location in the system is 8 bits. Assume the system has one 4 MB memory block used as ROM residing at th

Calculate the peak manning and average rate of software, Q. A software proj...

Q. A software project is planned to cost 95PY in a period of 1 year and 9 months. Calculate the peak manning and average rate of software them build up. Ans. Software project

Discuss the various strategies of design, Q. Discuss the various strategies...

Q. Discuss the various strategies of design. Which design strategy is most popular and practical? Ans The most commonly utilized software design strategy involved decomposing

What is software fault, Software faults are unseen programming errors. Soft...

Software faults are unseen programming errors. Software faults are errors in the correctness of the semantics of computer programs.

What is the disadvantage of the set protocol, Question: (a) What mecha...

Question: (a) What mechanism does illegal spammers exploit to send spam? (b) What is a hoax? (c) Name two ways in which you can increase the privacy of e-mail. (d)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd