Searching the database - micro cds/isis application, Software Engineering

Assignment Help:

Searching the Database:

Searching the database and printing the results of a search are important features associated with CDS/ISIS package. The query formulation strategy provided in the package uses basically Boolean logic which is enriched by proximity operators. The software allows searching only on indexed fields (through FST). Searches may be stored and recalled again for display. sorting, writing to disk or printing. Saved search expressions may also be combined by using Boolean operators to further refine the searches. The search results may be output in a variety of formats by using the formatting language, In addition to the main features discussed in the foregoing sections, the 'micro CDS/ISIS package provides data exchange facilities. In other words, the software package is able to accept and to produce data files applying the ISO 2709 standard format. This facility allows moving of databases from one information management system to another.  


Related Discussions:- Searching the database - micro cds/isis application

Describe the prototyping methods in software process, Describe the prototyp...

Describe the prototyping methods in software process. Two methods i. Evolutionary prototyping - In this approach of system development, the early prototype is prepared and i

What is role of software engineer in software development, Q Who is a Softw...

Q Who is a Software Engineer? What is his role in software development process? Ans) A software engineer is responsible for the implementation and design of a variety of softwa

Define the stress testing, Define the Stress testing: - It checks the r...

Define the Stress testing: - It checks the robustness of application. - It verifies that application consistently gives satisfactory performance under unfavorable and extrem

What are the types of software system requirements, What are the types of S...

What are the types of Software system requirements? Functional requirements: Services the system should give. Non-functional requirements: Constraints on the services.

What do you understand by the term integrity, Question: (a) What do yo...

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

Explain throw-away prototyping and evolutionary prototyping, Q. Explain thr...

Q. Explain throw-away prototyping and evolutionary prototyping. Discuss the differences between the two. Ans Throw-Away Prototyping as well called close ended prototyping .

Software configuration management , Software configuration management is a...

Software configuration management is an umbrella activity which is applied by the software procedure. SCM identifies controls, audits and reports modifications that invariably occ

Creating the field selection table - database definition, Creating the Fiel...

Creating the Field Selection Table (FST) : Entering of data and creating indexes for searching is a very important feature associated with any information storage and retriev

Explain validation, Validation (Product Oriented) Validation is worried...

Validation (Product Oriented) Validation is worried with whether the right functions of the program have been properly executed, and that this function will properly make the c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd