Indexing and abstracting databases, Basic Computer Science

Indexing and Abstracting Databases:

A study of growth of indexing and abstracting services over the years would show that during the past two centuries, these services have been trying to help the information communication process mentioned above. However, the increasing tempo and baffling complexity of information generation were causing enormous strain on the resources and capabilities of these information communication systems. But the advent of computers in the fifties and their applications and the developments in the field of communication technology also have been of great help in improved bibliographical control and access of documents. With these developments, the machine readable records have become most useful as databases, enabling the users to -get access to the required information at a much faster rate. These databases are available on (i) CD-ROM which the libraries can search on their own computers and (ii) networks on which the databases of major libraries as well as those of the conglomerates like Lockheed (DIALOG) and System Development Corporation (ORBIT) are accessible. Because of such large databases and their availability for conducting literature searches through networks and vendors, there now exists enhanced access opportunities to world literature output in a given discipline,  

Posted Date: 10/23/2012 9:04:15 AM | Location : United States







Related Discussions:- Indexing and abstracting databases, Assignment Help, Ask Question on Indexing and abstracting databases, Get Answer, Expert's Help, Indexing and abstracting databases Discussions

Write discussion on Indexing and abstracting databases
Your posts are moderated
Related Questions
Concept of operating system: An operating system is an essential software component of a computer system. The basic  objectives of an operating system are to make the computer

describe the two fundament purpose of surveying

QUESTION (a) Distinguish between S-HTTP and SSL (b) What are the three basic security provided by SSL? (c) Discuss the limitations of SSL (d) State the port number us

Why we need data mining? Give an example to illustrate your answer.

what problems does one encounter when you have more pipelines?

READYMADE VERSUS CUSTOM-MADE SOFTWARE Nursing care software can be in two forms. Software can be custom-made with the help of a computer programmer, suited for a client with v

Ask question #Minimum. Hello. ser can. you. tell. me. that. what. is. the. batter. side. for. BIOLOGY. Students. from. class. 12. / xii. 100 words accepted#


Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca