Micro cds-isis application, Software Engineering

Micro CDS/ISIS Application:

In libraries there are a number of repetitive operations. If one Miens the procedures for ordering, receiving, processing and circulating a book, one can observe that the same basic .information such as author, title, date of publication, etc. is used in acquisition forms, catalogue cards, circulation lists, etc. This leads to duplication of effort. Micro-computer-based database management programs like CDS/ISIS are being used to obviate this type of duplication in library work. This can be done by entering different pieces of information such as author, etc., into the database management programs like CDS/ISIS and then manipulating it to produce various types of outputs. This section discusses, how micro CDS/ISIS is used in developing a micro CDS/ISIS application. 

In developing a CDS/ISIS application the following tasks must be performed: 

  • application design 
  • database definition 
  • data entry and
  • indexing searching  
Posted Date: 10/24/2012 3:16:32 AM | Location : United States







Related Discussions:- Micro cds-isis application, Assignment Help, Ask Question on Micro cds-isis application, Get Answer, Expert's Help, Micro cds-isis application Discussions

Write discussion on Micro cds-isis application
Your posts are moderated
Related Questions
Explain the process of Black box testing  This is applied during the later stage of testing.  It enables software developer to derive a set of input conditions which will fully

What is Requirement Traceability? Explain its importance. Requirement Traceability is mapping of needs to test cases. There are two major traceability: Forward and Backward. It

Worldwide Translations Agency is a company that undertakes translations to and from the major languages of the world. All sorts of documents including letters, reports, operating i

Products, services, or information required from suppliers to make a process work.

What is reverse engineering?    It is a process of examining software with a view to understanding its design and specification. -  In reverse engineering, source code and i

What are the different architectures developed during BPE? Data architecture àframework for the information needs of a business. Application architecture à incorporates the

What are the various types of traceability in software engineering? i. Source traceability - These are basically the links from requirement to stakeholders who propose these

Write the Problems with the CMM. Practices associated with model levels Companies could be using practices from dissimilar levels at the same time but if all practices

Information engineering is a system  engineering approach which is used to describe architectures which enable a business to use data professionally. The intent of information eng

Write down any four application of a stack. (i)  Conversion of infix to postfix form (ii)  Reversing of a line. (iii) Removal of recursion (iv) Evaluating post fix expression