Micrography technology, Computer Engineering

Assignment Help:

Micrography:

Micrographic technology is an outgrowth of photographic technology. Since this technology is being increasingly used to supplement computer systems, strong electronic and photo-electronic influences make it multi-technology dependent. Micrographic technology finds its application not only as a publishing medium but also, as a communication medium, computer output medium, and storage medium. In the past, the use of microform as a publishing medium was limited because of inherent limitations. It may be stated that the widely known field of use for this technology was in connection with archivation and for file and library compaction, in which microforms replace traditional paper publications. Micropublishing for selective retrieval should be seen as user-oriented application in the context of changing information' transfer needs. It involves two separate, but interlinked distribution processes, (i) publication of full content on microforms, and (ii) distribution of retrieval support information (i.e., index, access to database, etc.). This support information is the key to the retrieval. It can be made available on any medium (such as paper, microfilm, magnetic tape or floppy disk) that provides ease of access to location codes for the full information on microforms.  


Related Discussions:- Micrography technology

Explain priority interrupt, What is priority interrupt? A priority inte...

What is priority interrupt? A priority interrupt is an interrupt that establishes a priority over the various sources to verify which condition is to be serviced first when two

Assembler directives, What are assembler directives? Ans: These are th...

What are assembler directives? Ans: These are the instructions that direct the program to be executed. They have no binary corresponding so they are called pseudo-opcodes. The

Chains of inference, Chains of Inference: Now we have to look at how t...

Chains of Inference: Now we have to look at how to get an agent to prove a given theorem using various search strategies? Thus we have noted in previous lectures that, there i

Explain properties of the webservice attribute, Question: (a) (i) Expl...

Question: (a) (i) Explain properties of the WebService attribute. (ii) Discuss three properties of the WebMethod attribute. (b) What are WSDL documents used for? (c)

Inspirations of artificial intelligence, Inspirations of artificial intelli...

Inspirations of artificial intelligence: Artificial Intelligence research can be easily understood by following example in terms of how the following question has been answere

Which network connects multiple company locations, A/An                net...

A/An                network is typically a company network that connects multiple company locations into a single network. (A)  local area                                  (B

What is a table pool, What is a table pool? A table pool (or pool) is ...

What is a table pool? A table pool (or pool) is used to join several logical tables in the ABAP/4 Dictionary.  The definition of a pool having of at least two key fields and a

Determine about the security methods, Determine about the Security methods ...

Determine about the Security methods Security methods also protect information from accidental or intentional modification, manipulation or destruction. Most security experts o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd