Searching the database - micro cds/isis application, Software Engineering

Assignment Help:

Searching the Database:

Searching the database and printing the results of a search are important features associated with CDS/ISIS package. The query formulation strategy provided in the package uses basically Boolean logic which is enriched by proximity operators. The software allows searching only on indexed fields (through FST). Searches may be stored and recalled again for display. sorting, writing to disk or printing. Saved search expressions may also be combined by using Boolean operators to further refine the searches. The search results may be output in a variety of formats by using the formatting language, In addition to the main features discussed in the foregoing sections, the 'micro CDS/ISIS package provides data exchange facilities. In other words, the software package is able to accept and to produce data files applying the ISO 2709 standard format. This facility allows moving of databases from one information management system to another.  


Related Discussions:- Searching the database - micro cds/isis application

Different characteristics of software measures, Different characteristics o...

Different characteristics of software measures Different characteristics of software measures identified by Basili (1989) are given below: • Objects of measurement: They i

What is statement testing, Testing to satisfy the criterion that every stat...

Testing to satisfy the criterion that every statement in a program be implemented at least once during program testing.

Elicitation, explain the goal oriented requirement elicitation process with...

explain the goal oriented requirement elicitation process with a neat sketch

Static single variable model and static multivariable model, Q. Static sing...

Q. Static single variable model and static multivariable model? Static single variable model : Methods using this model utilize an equation to estimate the desired value such

Whta is boundary value analysis, Boundary Value Analysis:    It's widely ex...

Boundary Value Analysis:    It's widely examined that input values at the extreme ends of input domain cause more errors in system. More application errors happen at the boundaries

Why we use coverage analyzers, Q. Why we use Coverage analyzers? Cover...

Q. Why we use Coverage analyzers? Coverage analyzers (execution verifiers) A coverage analyzer is the most common and important tool for testing. It is often relatively simpl

Iterative Enhancement Model, what is the advantage of Iterative Enhancement...

what is the advantage of Iterative Enhancement Model in developing a system?

Software methodology, how to choose a software methodology for a software p...

how to choose a software methodology for a software project

Normalization, normalization Explain its forms in brief

normalization Explain its forms in brief

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd