Examples of online databases, Basic Computer Science

Examples of Online Databases:

The adoption of modern technology has resulted in the proliferation of machine readable databases. The National Library of Medicine (USA) designed its MEDLARS which became operational in 1964. Later appeared its online version as MEDLINE. Engineering Index of the Engineers° Joint Council (USA) and Biological Abstracts soon had their corresponding online versions, viz., COMPENDEX and BIOSIS. Yet another very large online database is that of Information Services for Physics and Engineering Communities, called INSPEC (UK) representing the three printed versions of Physics Abstracts, Electrical and Electronic Abstracts and Computers and Control Abstracts.

CA Search and AGRICOLA, the online counterparts respectively of Chemical Abstracts and Bibliography of Agriculture (NAL, USA) are worth mentioning. These are all also devoted to sciences. Of the social sciences, there exist a number of large online databases particularly in economics, psychology, political science and management. For example, PsychINFO is the online version of Psychological Abstracts. 

MARC database of the Library of Congress is a good source to search for resources in humanities. It is also worthwhile to know about two full text online databases: one is LEXIS in law and the other is NEXIS that offers several newspapers and business publications. 

Posted Date: 10/23/2012 9:05:58 AM | Location : United States







Related Discussions:- Examples of online databases, Assignment Help, Ask Question on Examples of online databases, Get Answer, Expert's Help, Examples of online databases Discussions

Write discussion on Examples of online databases
Your posts are moderated
Related Questions
Uninformed Search Strategies: To be able to undertake a regular search, our entire agent ought to know is the starting state, the possible operators and how to check whether th


number of 4 to 16 line decoders required to get 8 lto 256 line decoder

Question 1 Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the eve

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

The threading module offered with Python includes a simple-to-implement locking mechanism that will permit you to synchronize threads. A new lock is formed by calling the Lock() me

SOCIAL NETWORKING:  A social network is a network of individuals which have some sort of interdependence on each other. This interdependence may be in the form of friendship,

COMPONENTS OF A COMPUTER: We use a computing system basically to feed in some data that is processed by the computer and some information is generated as a result.. For this w

QUESTION Your Library is currently offering access to the Internet for its subscribers on a fee paying basis. Subscribers should make a booking for each slot of one hour in adv

Question 1 Explain the components of the .NET Framework also give a diagram for this Question 2 Explain Code Editor Window and Solution Explorer Question 3 Write a