Searching the database - micro cds/isis application, Software Engineering

Searching the Database:

Searching the database and printing the results of a search are important features associated with CDS/ISIS package. The query formulation strategy provided in the package uses basically Boolean logic which is enriched by proximity operators. The software allows searching only on indexed fields (through FST). Searches may be stored and recalled again for display. sorting, writing to disk or printing. Saved search expressions may also be combined by using Boolean operators to further refine the searches. The search results may be output in a variety of formats by using the formatting language, In addition to the main features discussed in the foregoing sections, the 'micro CDS/ISIS package provides data exchange facilities. In other words, the software package is able to accept and to produce data files applying the ISO 2709 standard format. This facility allows moving of databases from one information management system to another.  

Posted Date: 10/24/2012 3:23:48 AM | Location : United States







Related Discussions:- Searching the database - micro cds/isis application, Assignment Help, Ask Question on Searching the database - micro cds/isis application, Get Answer, Expert's Help, Searching the database - micro cds/isis application Discussions

Write discussion on Searching the database - micro cds/isis application
Your posts are moderated
Related Questions
What is the meaning of requirement engineering? Requirement engineering defined as the process of setting up the services that the customer requires from the system and the co

A manual [formal] testing [error detection] method where the programmer reads source code, statement by statement, to a group who ask questions determined the program logic, determ

What is the Key Process Areas SEI has associated key process areas(KPAs) with every maturity level. KPA is an indicative measurement of goodness of software engineering functi

What is Data Flow Analysis? Ans) Having of the graphical analysis of collections of (sequential) data definitions and reference patterns to verify constraints that can be placed


What is the use of knowledge of risk acceptance to engineers?  The past experience and historical data give better information about safety of products designing there are stil

Distinguish between alpha and beta testing.  Alpha and beta testing are the types of acceptance testing.  Alpha test: The alpha testing is attesting in which the version o

What are the principle stages of VORD method? Viewpoint identification: Identify the services given to each viewpoint. Viewpoint structuring: Grouping linked viewpoints in t

The sudden and finish failure of a computer system or component.

Explain the Throw away prototype In this technique, prototype is discarded once its purpose is fulfilled and final system is built from scratch. Prototype is built quickly t